Sciweavers

1172 search results - page 208 / 235
» Approximate Reasoning Based on Similarity
Sort
View
VTC
2008
IEEE
117views Communications» more  VTC 2008»
14 years 3 months ago
Design of Rate Constrained Multi-User Receivers for Satellite Communications
—In the realm of satellite communications, one of the great impairments to increase the spectral efficiency is multi-user interference in the reverse link (mobile to satellite). ...
Sami Mekki, Mérouane Debbah
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
ECAI
1994
Springer
14 years 1 months ago
The DUAL Cognitive Architecture: A Hybrid Multi-Agent Approach
1 A hybrid (symbolic/connectionist) cognitive architecture, DUAL, is proposed. It is a multi-agent system which consist of a large number of non-cognitive, relatively simple agents...
Boicho N. Kokinov
APCCM
2006
13 years 10 months ago
Defining and implementing domains with multiple types using mesodata modelling techniques
The integration of data from different sources often leads to the adoption of schemata that entail a loss of information in respect of one or more of the data sets being combined....
Sally Rice, John F. Roddick, Denise de Vries
BMCBI
2005
105views more  BMCBI 2005»
13 years 8 months ago
Secondary structure assignment that accurately reflects physical and evolutionary characteristics
Background: Secondary structure is used in hierarchical classification of protein structures, identification of protein features, such as helix caps and loops, for fold recognitio...
Maria Vittoria Cubellis, Fabien Cailliez, Simon C....