Skip to main content
    • by 
    •   3  
      Computer ScienceCryptographySmartcard
    • by 
    •   7  
      Computer ScienceOracleProvable SecurityRandom Oracle Model
    • by 
    •   11  
      EngineeringMathematicsComputer ScienceComputational Complexity
    • by 
    •   8  
      Computer ScienceWireless Sensor NetworksComputer NetworkCluster Analysis
    • by 
    •   20  
      Computer ScienceParallel ComputingComputational ComplexityOpen Source Software
    • by 
    •   20  
      Computer ScienceParallel ComputingComputational ComplexityOpen Source Software
    • by 
    •   14  
      Computer ScienceComputational Complexity TheoryComputational ComplexityDynamic programming
    • by 
    •   13  
      MathematicsApplied MathematicsComputational ComplexityCombinatorics
    • by 
    •   6  
      Computer ScienceMachine LearningFuzzy ClusteringCluster Analysis
ONCE UPON A TIME there was a system administrator A of a computer network who , wanting to secure a area of the network, utilized what he called an heavy complexity Enigma Turing machine TM e to create or find passwords. The... more
    • by 
    • by 
    •   3  
      Computer SciencePulse ShapingOrthogonal Frequency Division Multiplexing
In this paper, graphs called overtrees are introduced and studied. These are connected graphs that contain a single simple cycle. Such graphs are connected graphs following the trees in terms of the number of edges. An overtree can be... more
    • by 
    •   2  
      ColoringChromatic polynomial
    • by 
    •   20  
      Computer ScienceAlgorithmsArtificial IntelligenceComputer Vision
    • by 
    •   9  
      Computer ScienceDistributed ComputingComputational ComplexitySpectrum
Cognitive radio is an emerging technology that aims for efficient spectrum usage. Cognitive radios have been proposed as a solution to the spectrum underutilization problem and have been proven to increase spectrum efficiency whilst... more
    • by 
    •   3  
      Computer ScienceCognitive radioThroughput
    • by 
    •   9  
      MathematicsComputer ScienceComputational ComplexityCryptography
In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values are equal, a hash... more
    • by 
    •   9  
      MathematicsComputer ScienceComputational ComplexityCryptography
    • by 
    •   7  
      Computer ScienceComputer SecurityCognitive radioReputation
Cognitive Radio (CR) can be defined as a technology that allows users to change the transmission parameters as required to increase the spectrum efficiency. Because of this mechanism, some threats emerge. Two major threats are found in... more
    • by 
    •   7  
      Computer ScienceComputer SecurityCognitive radioReputation
    • by 
    •   6  
      MathematicsGeologyGeophysicsPhysics
    • by 
    •   7  
      MathematicsComputer SciencePhysicsOMEGA
    • by 
    •   7  
      MathematicsComputer SciencePhysicsOMEGA
It is shown that a full-dimensional polytope P is uniquely determined by its r-dimensional fibre polytopes when $$r \ge 2$$ r ≥ 2 . Further, if $$r \ge 4$$ r ≥ 4 and the r-dimensional fibre polytopes are zonotopes, then P itself must be a... more
    • by 
    •   3  
      MathematicsPure MathematicsPolytope
    • by 
    •   15  
      MathematicsComputer ScienceComputational Complexity TheorySignal Processing
    • by 
    • by 
    •   7  
      Computer ScienceAlgorithmMPEGDiscrete Cosine Transform
    • by 
    • by 
    •   13  
      Computer ScienceHigh Performance ComputingChemistryComputational Complexity
    • by 
    • Economics
    • by 
    •   5  
      HistoryCognitive ScienceLinguisticsNegation
    • by 
    •   2  
      MathematicsStil
    • by 
    •   3  
      Computer ScienceSyntaxGLOSSA
    • by 
    •   3  
      Computer ScienceSyntaxNegation
In this article we analyze the internal structure of bare universal and negative quantifiers in Italian varieties, taking into consideration both synchronic and diachronic variation. It is proposed that bare quantifiers are not standard... more
    • by 
    •   6  
      MathematicsLinguisticsLinguistic VariationSyntactic change and variation
    • by 
    •   6  
      Cognitive ScienceComputer ScienceComputational ComplexityCase Based Planning
We focus on the random generation of SAT instances that have properties similar to real-world instances. It is known that many industrial instances, even with a great number of variables, can be solved by a clever solver in a reasonable... more
    • by 
    •   7  
      EngineeringMathematicsAlgorithmsCombinatorics
    • by 
    •   6  
      PsychologyCognitive ScienceComputer ScienceSyntax
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceComputer VisionMobile Robot
    • by 
    •   10  
      Information SystemsComputer ScienceDistributed ComputingLoad Balancing
    • by 
    •   8  
      Computer ScienceNeural NetworksComputer NetworkCDMA
    • by 
    •   4  
      MathematicsApplied MathematicsComputer ScienceAlgorithm
    • by 
    •   11  
      Computer ScienceDistributed ComputingReal Time ComputingModeling and Simulation
    • by 
    •   4  
      MathematicsReliability TheoryComputer SoftwareElectrical And Electronic Engineering
    • by 
    •   14  
      Applied MathematicsEconomicsMathematical EconomicsGame Theory
    • by 
    •   13  
      Computer ScienceEconomicsMathematical EconomicsComputational Complexity
    • by 
    •   13  
      Computer ScienceEconomicsMathematical EconomicsComputational Complexity
Let γ (G) denote the cardinality of a minimum dominating set of a graph G. A well-known upper bound for γ (G), due to Berge (1962), states that for any graph G of order n and maximum degree∆, γ (G)≤ n−∆. Similarly, Hedetniemi and Laskar... more
    • by 
    •   10  
      MathematicsComputer ScienceCombinatoricsMinimum Connected Dominating Set
The Symmetric Primal-Dual Symplex Pivot Decision Strategy (spdspds) is a novel iterative algorithm to solve linear programming problems. A symplex pivoting operation is considered simply as an exchange between a basic (dependent) variable... more
    • by 
    •   5  
      Computational ComplexityLinear ProgrammingOptimizationsymmetric primal dual simplex
Publication in the conference proceedings of EUSIPCO, Rhodes, Greece, 1998
    • by 
    •   8  
      MathematicsComputer ScienceArtificial IntelligenceKalman Filter
    • by 
    •   15  
      EngineeringComputer ScienceComputer VisionComputational Complexity