Sciweavers

780 search results - page 14 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
BIOINFORMATICS
2006
106views more  BIOINFORMATICS 2006»
13 years 7 months ago
Identification of biochemical networks by S-tree based genetic programming
Motivation: Most previous approaches to model biochemical networks havefocusedeither on the characterization of a networkstructurewith a number of components or on the estimation ...
Dong-Yeon Cho, Kwang-Hyun Cho, Byoung-Tak Zhang
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 11 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
FC
2010
Springer
180views Cryptology» more  FC 2010»
13 years 8 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...
FSS
2006
154views more  FSS 2006»
13 years 7 months ago
Sequential Adaptive Fuzzy Inference System (SAFIS) for nonlinear system identification and prediction
In this paper, a Sequential Adaptive Fuzzy Inference System called SAFIS is developed based on the functional equivalence between a radial basis function network and a fuzzy infer...
Hai-Jun Rong, N. Sundararajan, Guang-Bin Huang, P....
GLOBECOM
2007
IEEE
14 years 1 months ago
A Busy-Tone Based MAC Scheme for Wireless Ad Hoc Networks Using Directional Antennas
— Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppre...
Hongning Dai, Kam-Wing Ng, Min-You Wu