This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...
Nowadays, the rapid advances in wireless communications, positioning techniques and mobile devices enable location based service such as dynamic traffic navigation. Yet, it is a ch...
Yun Bai, Yanyan Guo, Xiaofeng Meng, Tao Wan, Karin...
--With the development of networked real-time embedded systems, the ability to guarantee traffic throughput rates and to decrease delay, energy, and loss rates, is particularly imp...
Meikang Qiu, Jiande Wu, Chun Jason Xue, Jingtong H...
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
We show the emergence of Swarm Intelligence in physical robots. We transfer an optimization algorithm which is based on beeforaging behavior to a robotic swarm. In simulation this...
Sjriek Alers, Daan Bloembergen, Daniel Hennes, Ste...