Sciweavers

3328 search results - page 182 / 666
» Topological Quantum Computation
Sort
View
106
Voted
CCS
2007
ACM
15 years 10 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
146
Voted
ICB
2007
Springer
134views Biometrics» more  ICB 2007»
15 years 10 months ago
Singular Points Analysis in Fingerprints Based on Topological Structure and Orientation Field
Abstract. As an important feature of fingerprints, singular points (includingcores and deltas) not only represent the local ridge pattern characteristics, but also determine the to...
Jie Zhou, Jinwei Gu, David Zhang
139
Voted
ANSS
2003
IEEE
15 years 9 months ago
An ns-based Bluetooth Topology Construction Simulation Environment
Bluetooth is an emerging technology in wireless applications, and many related issues are yet to be explored both in academia and industry. Because of the complexity and the dynam...
Chia-Jui Hsu, Yuh-Jzer Joung
123
Voted
ICNP
2003
IEEE
15 years 9 months ago
On the Cost-Quality Tradeoff in Topology-Aware Overlay Path Probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢¤£¦¥¨§© , which is prohibitive i...
Chiping Tang, Philip K. McKinley
APBC
2007
110views Bioinformatics» more  APBC 2007»
15 years 5 months ago
Fast Structural Similarity Search Based on Topology String Matching
ibe an abstract data model of protein structures by representing the geometry of proteins using spatial data types and present a framework for fast structural similarity search bas...
Sung-Hee Park, David Gilbert, Keun Ho Ryu