Sciweavers

1265 search results - page 142 / 253
» Finding the Key to a Synapse
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
AMI
2008
Springer
13 years 11 months ago
Analysis of Heart Stress Response for a Public Talk Assistant System
Conference presentations are stressful communication tasks for many speakers. This mental stress inhibits the speaker's ability to recall information and perceive the audience...
Martin Kusserow, Oliver Amft, Gerhard Tröster
APNOMS
2008
Springer
13 years 11 months ago
Towards Management Requirements of Future Internet
The Internet is one of the most successful modern technologies; we cannot imagine what our lives would be without the Internet. Despite the huge success of the Internet, many probl...
Sung-Su Kim, Mi-Jung Choi, Hong-Taek Ju, Masayoshi...
ARC
2008
Springer
126views Hardware» more  ARC 2008»
13 years 11 months ago
DNA Physical Mapping on a Reconfigurable Platform
Reconfigurable architectures enable the hardware function to be implemented by the user and, due to its characteristics, have been used in many areas, including Bioinformatics. One...
Adriano Idalgo, Nahri Moreano
ATAL
2008
Springer
13 years 11 months ago
On k-optimal distributed constraint optimization algorithms: new bounds and algorithms
Distributed constraint optimization (DCOP) is a promising approach to coordination, scheduling and task allocation in multi agent networks. In large-scale or low-bandwidth network...
Emma Bowring, Jonathan P. Pearce, Christopher Port...