Login / Signup

Secure Computer Communication using Chaotic Algorithms.

Mohamed I. SobhyAlaa-eldin R. Shehata
Published in: Int. J. Bifurc. Chaos (2000)
Keyphrases
  • learning algorithm
  • theoretical analysis
  • times faster
  • computationally efficient
  • communication networks
  • data sets
  • computational complexity
  • data mining techniques
  • orders of magnitude
  • resource constrained