Sciweavers

532 search results - page 22 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
TWC
2008
129views more  TWC 2008»
13 years 7 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
BMCBI
2010
156views more  BMCBI 2010»
13 years 7 months ago
Extended morphological processing: a practical method for automatic spot detection of biological markers from microscopic images
Background: A reliable extraction technique for resolving multiple spots in light or electron microscopic images is essential in investigations of the spatial distribution and dyn...
Yoshitaka Kimori, Norio Baba, Nobuhiro Morone
CDC
2009
IEEE
170views Control Systems» more  CDC 2009»
13 years 5 months ago
ESMF based multiple UAVs active cooperative observation method in relative velocity coordinates
based on extended set-membership filter (ESMF) and the path planning method in relative velocity coordinates (RVCs), a new 3D multiple Unmanned Aerial Vehicle (UAV) systems active ...
Feng Gu, Yuqing He, Jianda Han, Yuechao Wang
MICCAI
2007
Springer
14 years 8 months ago
Effectiveness of the Finite Impulse Response Model in Content-Based fMRI Image Retrieval
The thresholded t-map produced by the General Linear Model (GLM) gives an effective summary of activation patterns in functional brain images and is widely used for feature selecti...
Bing Bai, Paul B. Kantor, Ali Shokoufandeh
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 7 months ago
On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases
This article studies the expressive power of finite automata recognizing sets of real numbers encoded in positional notation. We consider Muller automata as well as the restricted ...
Bernard Boigelot, Julien Brusten, Véronique...