Sciweavers

768 search results - page 63 / 154
» Asymptotic Cellular Complexity
Sort
View
WS
2006
ACM
14 years 1 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
ASIACRYPT
2005
Springer
14 years 1 months ago
A Near-Practical Attack Against B Mode of HBB
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchro...
Joydip Mitra
ECAL
2005
Springer
14 years 1 months ago
A Developmental Model for Generative Media
Abstract. Developmental models simulate the spatio-temporal development of a complex system. The system described in this paper combines the advantages of a number of previously di...
Jon McCormack
CSE
2009
IEEE
14 years 13 days ago
Investigating Bimodal Clustering in Human Mobility
—We apply a simple clustering algorithm to a large dataset of cellular telecommunication records, reducing the complexity of mobile phone users’ full trajectories and allowing ...
James P. Bagrow, Tal Koren
IJBRA
2008
69views more  IJBRA 2008»
13 years 7 months ago
A matrix-based multilevel approach to identify functional protein modules
: Identifying functional modules is believed to reveal most cellular processes. There have been many computational approaches to investigate the underlying biological structures [2...
Suely Oliveira, Sang-Cheol Seok