Sciweavers

858 search results - page 18 / 172
» One Is Enough!
Sort
View
CORR
2008
Springer
80views Education» more  CORR 2008»
13 years 9 months ago
Reserved-Length Prefix Coding
Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all cod...
Michael B. Baer
JUCS
2006
68views more  JUCS 2006»
13 years 8 months ago
Time-varying H Systems Revisited
: We cast a new look on time-varying distributed H systems. In their original definition, where only new strings are passed to the next component, this language definition in itsel...
Remco Loos
NECO
2010
78views more  NECO 2010»
13 years 7 months ago
Hebbian Plasticity and Homeostasis in a Model of Hypercolumn of the Visual Cortex
Neurons in the nervous system display a wide variety of plasticity processes. Among them are covariance based rules and homeostatic plasticity. By themselves, the first ones tend...
R. Rossi Pool, G. Mato
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 3 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
DATE
2005
IEEE
116views Hardware» more  DATE 2005»
14 years 2 months ago
Uniformly-Switching Logic for Cryptographic Hardware
Recent work on Differential Power Analysis shows that even mathematically-secure cryptographic protocols may be vulnerable at the physical implementation level. By measuring energ...
Igor L. Markov, Dmitri Maslov