Zobrazeno 1 - 10
of 21
pro vyhledávání: '"A. Peinado Dominguez"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Linear Algebra and Its Applications 1 May 2003 364:1-12
Autor:
Barbancho-Perez, Ana Maria, Barbancho-Perez, Isabel, Tardon-Garcia, Lorenzo Jose, Peinado-Dominguez, Alberto, Munilla-Fajardo, Jorge, Ortiz-Garcia, Andres, Mata Contreras, Francisco Javier
Publikováno v:
RIUMA. Repositorio Institucional de la Universidad de Málaga
instname
instname
This work presents the evolution of the five editions of the educational activity named “Technological Challenge” specially focused on the students at “Escuela Técnica Superior de Ingeniería de Telecomunicación” (ETSIT), but open to all st
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::92d00e2e26c98775fecf80d820871c4f
https://hdl.handle.net/10630/16496
https://hdl.handle.net/10630/16496
Publikováno v:
RIUMA. Repositorio Institucional de la Universidad de Málaga
instname
instname
Medical image classification is currently a challenging task that can be used to aid the diagnosis of different brain diseases. Thus, exploratory and discriminative analysis techniques aiming to obtain rep- resentative features from the images, play
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::28400baa7174485ffa3bb5ddd8c38059
http://hdl.handle.net/10630/14137
http://hdl.handle.net/10630/14137
Publikováno v:
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
The orbits of quadratic functions in GF(2/sup n/) presents cycles of maximal length 2/sup n-l/-2. The characterization of the coefficient b allows the generation of such sequences for every n/spl ges/4. A pseudorandom sequence generator based on thes
Publikováno v:
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
Information security is of capital importance, and several cryptographic techniques have been developed to perform the security services required, not only data confidentiality. Taking into account the high speed of the current broadband, the only cr
Publikováno v:
In Optics Communications 15 December 2006 268(2):261-265
Publikováno v:
Electronics Letters. 34:1717
The sequence presented in the comment [see ibid., vol. 34, p. 1057-8, 1998] is not a counterexample for the linear complexity of Blum-Blum-Shub (BBS) sequences [see Siam J. Comput., vol. 15, p. 364-83, 1986], although we agree that the proof of our p
Publikováno v:
Electronics Letters. 34:450
Pseudorandom sequences produced by the Blum-Blum-Shub generator are seen to be useful in a wide range of applications. Recently, much attention has been paid to their linear complexity. The authors present a lower bound on the linear complexity for b