Sciweavers

2297 search results - page 377 / 460
» A fast APRIORI implementation
Sort
View
CORR
2006
Springer
189views Education» more  CORR 2006»
15 years 4 months ago
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks
Abstract--In wireless networks, important network functionalities such as power control, rate allocation, routing, and congestion control must be optimized in a coherent and integr...
Yufang Xi, Edmund M. Yeh
IJNSEC
2008
103views more  IJNSEC 2008»
15 years 4 months ago
On Cipher Design Based on Switchable Controlled Operations
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the desi...
Nikolay A. Moldovyan
IBIS
2006
109views more  IBIS 2006»
15 years 4 months ago
Formulation Schema Matching Problem for Combinatorial Optimization Problem
: Schema matching is the task of finding semantic correspondences between elements of two schemas, which plays a key role in many database applications. In this paper, we cast the ...
Zhi Zhang, Pengfei Shi, Haoyang Che, Yong Sun, Jun...
IJRR
2008
75views more  IJRR 2008»
15 years 4 months ago
Planning Time-Minimal Safe Paths Amidst Unpredictably Moving Obstacles
In this paper we discuss the problem of planning safe paths amidst unpredictably moving obstacles in the plane. Given the initial positions and the maximum speeds of the moving ob...
Jur P. van den Berg, Mark H. Overmars
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 4 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon