Sciweavers

267 search results - page 19 / 54
» Signatures of Combinatorial Maps
Sort
View
IJNSEC
2006
56views more  IJNSEC 2006»
13 years 9 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams
PKC
2005
Springer
114views Cryptology» more  PKC 2005»
14 years 2 months ago
Cryptanalysis of the Tractable Rational Map Cryptosystem
In this paper, we present the cryptanalysis of a public key scheme based on a system of multivariate polynomial equations, the ”tractable rational map” cryptosystem. We show co...
Antoine Joux, Sébastien Kunz-Jacques, Fr&ea...
TROB
2011
112views more  TROB 2011»
13 years 4 months ago
Mapping and Pursuit-Evasion Strategies For a Simple Wall-Following Robot
— This paper defines and analyzes a simple robot with local sensors that moves in an unknown polygonal environment. The robot can execute wall-following motions and can traverse...
Max Katsev, Anna Yershova, Benjamín Tovar, ...
ICANN
2009
Springer
14 years 1 months ago
A Two Stage Clustering Method Combining Self-Organizing Maps and Ant K-Means
This paper proposes a clustering method SOMAK, which is composed by Self-Organizing Maps (SOM) followed by the Ant K-means (AK) algorithm. The aim of this method is not to find an...
Jefferson R. Souza, Teresa Bernarda Ludermir, Lean...
IPPS
2000
IEEE
14 years 1 months ago
Heuristic Solutions for a Mapping Problem in a TV-Anytime Server Network
This paper presents a novel broadband multimedia service called TV-Anytime. The basic idea of this service is to store broadcast media assets onto media server systems and allow c...
Xiaobo Zhou, Reinhard Lüling, Li Xie