Login / Signup
Secure Computer Communication using Chaotic Algorithms.
Mohamed I. Sobhy
Alaa-eldin R. Shehata
Published in:
Int. J. Bifurc. Chaos (2000)
Keyphrases
</>
learning algorithm
theoretical analysis
times faster
computationally efficient
communication networks
data sets
computational complexity
data mining techniques
orders of magnitude
resource constrained