Sciweavers

4911 search results - page 860 / 983
» Tree dependence analysis
Sort
View
PRL
2007
180views more  PRL 2007»
13 years 10 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
INFOCOM
2010
IEEE
13 years 8 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li
IPL
2010
112views more  IPL 2010»
13 years 8 months ago
The cost of probabilistic agreement in oblivious robot networks
In this paper, we look at the time complexity of two agreement problems in networks of oblivious mobile robots, namely, at the gathering and scattering problems. Given a set of ro...
Julien Clement, Xavier Défago, Maria Gradin...
JASIS
2010
316views more  JASIS 2010»
13 years 8 months ago
Information sources and perceived success in corporate finance
: The work of corporate finance professionals is information intensive. In spite of that the practices and motivations of their information preferences have been researched very li...
Isto Huvila
TFS
2008
129views more  TFS 2008»
13 years 8 months ago
A Functional-Link-Based Neurofuzzy Network for Nonlinear System Control
Abstract--This study presents a functional-link-based neurofuzzy network (FLNFN) structure for nonlinear system control. The proposed FLNFN model uses a functional link neural netw...
Cheng-Hung Chen, Cheng-Jian Lin, Chin-Teng Lin