Sciweavers

120 search results - page 22 / 24
» isci 2006
Sort
View
ISCI
2008
104views more  ISCI 2008»
13 years 9 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
ISCI
2008
95views more  ISCI 2008»
13 years 9 months ago
Modified constrained learning algorithms incorporating additional functional constraints into neural networks
In this paper, two modified constrained learning algorithms are proposed to obtain better generalization performance and faster convergence rate. The additional cost terms of the ...
Fei Han, Qing-Hua Ling, De-Shuang Huang
ISCI
2007
138views more  ISCI 2007»
13 years 9 months ago
A fast algorithm for one-unit ICA-R
Independent component analysis (ICA) aims to recover a set of unknown mutually independent source signals from their observed mixtures without knowledge of the mixing coefficients...
Qiu-Hua Lin, Yong-Rui Zheng, Fuliang Yin, Hualou L...
ISCI
2007
130views more  ISCI 2007»
13 years 9 months ago
Computing with words and its relationships with fuzzistics
ct 9 Words mean different things to different people, and so are uncertain. We, therefore, need a fuzzy set model for a word 10 that has the potential to capture their uncertaint...
Jerry M. Mendel
ISCI
2007
170views more  ISCI 2007»
13 years 9 months ago
Automatic learning of cost functions for graph edit distance
Graph matching and graph edit distance have become important tools in structural pattern recognition. The graph edit distance concept allows us to measure the structural similarit...
Michel Neuhaus, Horst Bunke