Sciweavers

7200 search results - page 90 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
JUCS
2006
137views more  JUCS 2006»
13 years 10 months ago
Progress in Quantum Computational Cryptography
: Shor's algorithms for the integer factorization and the discrete logarithm problems can be regarded as a negative effect of the quantum mechanism on publickey cryptography. ...
Akinori Kawachi, Takeshi Koshiba
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
14 years 2 months ago
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare
The U.S. military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been...
Mark Adkins, John Kruse, Robert Younger
CMSB
2009
Springer
14 years 4 months ago
The Equivalence between Biology and Computation
A major challenge in computational systems biology is the articulation of a biological process in a form which can be understood by the biologist yet is amenable to computational e...
John K. Heath
ICCS
2005
Springer
14 years 3 months ago
"Plug-and-Play" Cluster Computing HPC Designed for the Mainstream Scientist
At UCLA's Plasma Physics Group, to achieve accessible computational power for our research goals, we developed the tools to build numerically-intensive parallel computing clus...
Dean E. Dauger, Viktor K. Decyk
ICPR
2008
IEEE
14 years 4 months ago
An approximate algorithm for median graph computation using graph embedding
Graphs are powerful data structures that have many attractive properties for object representation. However, some basic operations are difficult to define and implement, for ins...
Miquel Ferrer, Ernest Valveny, Francesc Serratosa,...