Sciweavers

IJAR
2016
39views more  IJAR 2016»
10 years 1 months ago
On expressiveness of the chain graph interpretations
In this article we study the expressiveness of the different chain graph interpretations. Chain graphs is a class of probabilistic graphical models that can contain two types of ...
Dag Sonntag, Jose M. Peña
IGPL
2016
68views more  IGPL 2016»
10 years 1 months ago
Different approaches for the detection of SSH anomalous connections
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks...
Silvia González, Álvaro Herrero, Jav...
IETIPR
2016
59views more  IETIPR 2016»
10 years 1 months ago
Early DIRECT mode decision based on all-zero block and rate distortion cost for multiview video coding
: The exhaustive variable-block-size mode decision can efficiently remove the redundancies among the multiview videos, while it also leads to significant increase of computational ...
Zhaoqing Pan, Yun Zhang, Jianjun Lei, Long Xu, Xin...
IEICET
2016
81views more  IEICET 2016»
10 years 1 months ago
Multi-Layer Perceptron with Pulse Glial Chain
Abstract—A glia is a nervous cell in the brain. Currently, the glia is known as a important cell for the human’s cerebration. Because the glia transmits signals to neurons and ...
Chihiro Ikuta, Yoko Uwate, Yoshifumi Nishio, Guoan...
IEICET
2016
75views more  IEICET 2016»
10 years 1 months ago
Broadband Circularly Polarized Stacked Patch Antenna for Universal UHF RFID Applications
– A double layer stacked patch antenna with a size of 200 × 200 × 48 mm3 is proposed in this investigation. To achieve broad CP bandwidth that can cover the universal UHF RFID ...
Chih-Chiang Chen, Bo-Shau Chen, Chow-Yen-Desmond S...
IEICET
2016
48views more  IEICET 2016»
10 years 1 months ago
Public-Key Encryption with Lazy Parties
In a public-key encryption scheme, if a sender is not concerned about the security of a message and is unwilling to generate costly randomness, the security of the encrypted messa...
Kenji Yasunaga


views
56 years 4 months ago