Sciweavers

MANSCI
2008
68views more  MANSCI 2008»
13 years 11 months ago
Product-Line Competition: Customization vs. Proliferation
Abstract Consumers are increasingly demanding products that closely match their individual preferences, and advances in manufacturing and information technologies have made it poss...
Haim Mendelson, Ali K. Parlaktürk
JMIV
2006
72views more  JMIV 2006»
13 years 11 months ago
A Unifying and Rigorous Shape from Shading Method Adapted to Realistic Data and Applications
We propose a new method for the Lambertian Shape From Shading (SFS) problem based on the notion of Crandall-Lions viscosity solution. This method has the advantage of requiring the...
Emmanuel Prados, Fabio Camilli, Olivier D. Faugera...
CSI
2007
192views more  CSI 2007»
13 years 11 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
JACM
2006
99views more  JACM 2006»
13 years 11 months ago
Finding a maximum likelihood tree is hard
Abstract. Maximum likelihood (ML) is an increasingly popular optimality criterion for selecting evolutionary trees [Felsenstein 1981]. Finding optimal ML trees appears to be a very...
Benny Chor, Tamir Tuller
CORR
2007
Springer
81views Education» more  CORR 2007»
13 years 11 months ago
Faster exon assembly by sparse spliced alignment
Assembling a gene from candidate exons is an important problem in computational biology. Among the most successful approaches to this problem is spliced alignment, proposed by Gelf...
Alexandre Tiskin
CORR
2007
Springer
108views Education» more  CORR 2007»
13 years 11 months ago
Noncoherent Low-Decoding-Complexity Space-Time Codes for Wireless Relay Networks
— The differential encoding/decoding setup introduced by Kiran et al, Oggier et al and Jing et al for wireless relay networks that use codebooks consisting of unitary matrices is...
G. Susinder Rajan, B. Sundar Rajan
IJON
2006
74views more  IJON 2006»
13 years 12 months ago
Spatio-temporal information coding in the cuneate nucleus
The dorsal column nuclei, cuneatus and gracilis, receive somesthetic information impinging on projection cells and local inhibitory interneurons. The presence of these interneuron...
Juan Navarro, Eduardo Sánchez, Antonio Cane...
IJNSEC
2006
92views more  IJNSEC 2006»
13 years 12 months ago
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang...
Ren-Chiun Wang, Chou Chen Yang
ISCI
2008
86views more  ISCI 2008»
13 years 12 months ago
On conditional diagnosability of the folded hypercubes
The n-dimensional folded hypercube FQn, a variation of the hypercube proposed by Ahmed et al. [A. El-Amawy, S. Latifi, Properties and performance of folded hypercubes, IEEE Transa...
Qiang Zhu 0003, San-Yang Liu, Min Xu
COMBINATORICS
2007
59views more  COMBINATORICS 2007»
13 years 12 months ago
New Optimal Constant Weight Codes
In 2006, Smith et al. published a new table of constant weight codes, updating existing tables originally created by Brouwer et al. This paper improves upon these results by fill...
Igor Gashkov, D. Taub