Sciweavers

7200 search results - page 19 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
ASIACRYPT
2001
Springer
14 years 9 days ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
JUCS
2002
81views more  JUCS 2002»
13 years 8 months ago
Membrane Computing: The Power of (Rule) Creation
: We consider a uniform way of treating objects and rules in P systems: we start with multisets of rules, which are consumed when they are applied, but the application of a rule ma...
Fernando Arroyo, Angel V. Baranda, Juan Castellano...
FSS
2008
127views more  FSS 2008»
13 years 8 months ago
On the computing power of fuzzy Turing machines
We work with fuzzy Turing machines (FTMs) and we study the relationship between this computational model and classical recursion concepts such as computable functions, recursively...
Benjamín René Callejas Bedregal, San...
ISBI
2008
IEEE
14 years 9 months ago
Acoustical power computation acceleration techniques for the planning of ultrasound therapy
The simulation of the effect of a high intensity ultrasound interstitial therapy is mainly connected on an accurate estimation of the pressure delivered by the transducer. This pa...
Jean-Louis Dillenseger, Carole Garnier
AICCSA
2006
IEEE
168views Hardware» more  AICCSA 2006»
14 years 2 months ago
Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor Networks
Collaborative signal processing is one of the most promising applications that are currently being investigated for sensor networks. In this paper, we use FFT computation as a veh...
Turkmen Canli, Ajay K. Gupta, Ashfaq A. Khokhar