Sciweavers

370 search results - page 71 / 74
» Limits of Constructive Security Proofs
Sort
View
MOBICOM
2005
ACM
14 years 1 months ago
Using mobile relays to prolong the lifetime of wireless sensor networks
In this paper we investigate the benefits of a heterogeneous architecture for wireless sensor networks composed of a few resource rich mobile nodes and a large number of simple s...
Wei Wang 0002, Vikram Srinivasan, Kee Chaing Chua
AE
2005
Springer
14 years 1 months ago
Evolutionary Design of a DDPD Model of Ligation
Ligation is a form of chemical self-assembly that involves dynamic formation of strong covalent bonds in the presence of weak associative forces. We study an extremely simple form ...
Mark A. Bedau, Andrew Buchanan, Gianluca Gazzola, ...
COMPGEOM
2003
ACM
14 years 1 months ago
Molecular shape analysis based upon the morse-smale complex and the connolly function
Docking is the process by which two or several molecules form a complex. Docking involves the geometry of the molecular surfaces, as well as chemical and energetical consideration...
Frédéric Cazals, Frédé...
IMAMS
2007
245views Mathematics» more  IMAMS 2007»
13 years 9 months ago
Discrete Surface Ricci Flow: Theory and Applications
Conformal geometry is in the core of pure mathematics. Conformal structure is more flexible than Riemaniann metric but more rigid than topology. Conformal geometric methods have p...
Miao Jin, Junho Kim, Xianfeng David Gu
SIROCCO
2008
13 years 9 months ago
Remembering without Memory: Tree Exploration by Asynchronous Oblivious Robots
In the effort to understand the algorithmic limitations of computing by a swarm of robots, the research has focused on the minimal capabilities that allow a problem to be solved. ...
Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nic...