Sciweavers

7200 search results - page 1226 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
KBS
2002
88views more  KBS 2002»
13 years 10 months ago
Mining the optimal class association rule set
We define an optimal class association rule set to be the minimum rule set with the same predictive power of the complete class association rule set. Using this rule set instead o...
Jiuyong Li, Hong Shen, Rodney W. Topor
PRL
2002
142views more  PRL 2002»
13 years 10 months ago
Matching of palmprints
This paper investigates the feasibility of person identification based on feature points extracted from palmprint images. Our approach first extracts a set of feature points along...
Nicolae Duta, Anil K. Jain, Kanti V. Mardia
SIAMDM
2002
124views more  SIAMDM 2002»
13 years 10 months ago
Counting Claw-Free Cubic Graphs
Let Hn be the number of claw-free cubic graphs on 2n labeled nodes. Combinatorial reductions are used to derive a second order, linear homogeneous differential equation with polyno...
Edgar M. Palmer, Ronald C. Read, Robert W. Robinso...
TIT
1998
70views more  TIT 1998»
13 years 10 months ago
The Poisson Multiple-Access Channel
—The Poisson multiple-access channel (MAC) models many-to-one optical communication through an optical fiber or in free space. For this model we compute the capacity region for ...
Amos Lapidoth, Shlomo Shamai
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 10 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
« Prev « First page 1226 / 1440 Last » Next »