Sciweavers

368 search results - page 27 / 74
» System BV is NP-complete
Sort
View
CN
2007
124views more  CN 2007»
14 years 9 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
COMCOM
2007
119views more  COMCOM 2007»
14 years 9 months ago
A new high rate adaptive wireless data dissemination scheme
With the increasing popularity of wireless networks and mobile computing, data broadcasting has emerged as an efficient way of delivering data to mobile clients having a high degr...
Petros Nicopolitidis, Georgios I. Papadimitriou, M...
IJON
2006
66views more  IJON 2006»
14 years 9 months ago
The interaction between facilitation and depression of two release mechanisms in a single synapse
The synapse from the lateral pyloric (LP) to the pyloric dilator (PD) neuron in the stomatogastric nervous system of the crab Cancer borealis has both a graded and a spike-mediate...
Lian Zhou, Robert LoMauro, Farzan Nadim
69
Voted
IJON
2006
68views more  IJON 2006»
14 years 9 months ago
Dendritic cable with active spines: A modelling study in the spike-diffuse-spike framework
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modelled with a simple integrate-and-fire process, whil...
Yulia Timofeeva, Gabriel J. Lord, Stephen Coombes
IVC
2006
163views more  IVC 2006»
14 years 9 months ago
Adaptive fingerprint image enhancement with fingerprint image quality analysis
Accurate minutiae extraction from fingerprint images is heavily dependent on the quality of the fingerprint images. In order to improve the performance of the system, much effort ...
Eun-Kyung Yun, Sung-Bae Cho