Sciweavers

4702 search results - page 19 / 941
» How to Copyright a Function
Sort
View
CISS
2007
IEEE
14 years 2 months ago
How Many Users should be Turned On in a Multi-Antenna Broadcast Channel
This paper considers broadcast channels with L antennas at the base station and m single-antenna users, where each user has perfect channel knowledge and the base station obtains c...
Wei Dai, Youjian Liu, Brian Rider
EVOW
2009
Springer
13 years 8 months ago
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
Abstract. Evolutionary algorithms such as genetic programming and grammatical evolution have been used for simultaneously optimizing network architecture, variable selection, and w...
Stephen D. Turner, Marylyn D. Ritchie, William S. ...
HICSS
2009
IEEE
77views Biometrics» more  HICSS 2009»
14 years 5 months ago
Users of Open Source Software - How Do They Get Help?
A study was conducted across multiple open source software online technical help communities. This paper presents the types of discussions that occur, the types of questions asked...
Vandana Singh, Michael B. Twidale, David M. Nichol...
EUROCRYPT
2001
Springer
14 years 3 months ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
ARC
2007
Springer
119views Hardware» more  ARC 2007»
14 years 5 months ago
Authentication of FPGA Bitstreams: Why and How
Abstract. Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authenticati...
Saar Drimer