We propose to develop a theoretical basis and experimental simulator of the first Immune-computer (IC) as a new kind of biomolecular computer. This IC will be able to control a fragment of the natural immune system in...
详细信息
The first processing step in computational early vision usually consists of convolutions with a number of kernels. These kernels often are derived from a mother kernel that is rotated, scaled, or deformed with respect...
详细信息
The first processing step in computational early vision usually consists of convolutions with a number of kernels. These kernels often are derived from a mother kernel that is rotated, scaled, or deformed with respect to other degrees of freedom. This paper presents an efficient computational approach to calculate the responses of arbitrary mother kernels with arbitrary deformations. Analytical solutions to this problem in most cases are difficult or not possible. Therefore, a numerical approach that emphasizes an algebraical point of view is presented.
This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during Septembe...
详细信息
ISBN:
(数字)9783642147067
ISBN:
(纸本)9783642147050
This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg institute for informatics and automation of RAS (SPIIRAS) in co- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical aspects of computer network and information security. MMM-ACNS 2010 provided the next international forum for sharing original - search results among specialists in fundamental and applied problems of computer network security. A total of 54 papers from 19 countries related to significant aspects of the theory and applications of computer network and information security were submitted to MMM-ACNS 2010: 16 papers were selected for regular and 6 for short presentations (30% of acceptance for full papers and 40% for all papers).
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September...
详细信息
ISBN:
(数字)9783540319986
ISBN:
(纸本)9783540291138
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg institute for informatics and automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The 1st and the 2nd International Workshops on Mathematical Methods, Models and Architectures for computer Network Security (MMM-ACNS 2001 and MMM-ACNS 2003), hosted by the St. Petersburg institute for informatics and automation, demonstrated the keen interest of the international research community in the subject area. It was recognized that conducting a biannual series of such workshops in St. Petersburg stimulates fruitful exchanges between the di?erent schools of thought, facilitates the dissemination of new ideas and promotesthespiritofcooperationbetweenresearchersontheinternationalscale. MMM-ACNS 2005 provided an international forum for sharing original - search results and application experiences among specialists in fundamental and applied problems of computer network security. An important distinction of the workshop was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly dependable computer networks.
暂无评论