Sciweavers

368 search results - page 54 / 74
» System BV is NP-complete
Sort
View
FGCS
2006
56views more  FGCS 2006»
14 years 9 months ago
Interactive 3D HD video transport for e-science collaboration over UCLP-enabled GLORIAD lightpath
Emerging large-scale applications for e-science and Grid require end-to-end lightpaths that need to be dynamically provisioned with QoS (quality of service) guarantees. In this pa...
Jinyong Jo, Wontaek Hong, Seungjoo Lee, Dongkyun K...
IJON
2008
156views more  IJON 2008»
14 years 9 months ago
Analysis of the dynamical behavior of a feedback auto-associative memory
The dynamical behavior and the stability properties of fixed points in a feedback auto-associative memory are investigated. The proposed structure encompasses a multi-layer percep...
Mahmood Amiri, Sohrab Saeb, Mohammad Javad Yazdanp...
IJON
2008
168views more  IJON 2008»
14 years 9 months ago
Spatial relationship representation for visual object searching
Image representation has been a key issue in vision research for many years. In order to represent various local image patterns or objects effectively, it is important to study th...
Jun Miao, Lijuan Duan, Laiyun Qing, Wen Gao, Xilin...
CN
2007
141views more  CN 2007»
14 years 9 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi