Sciweavers

1316 search results - page 63 / 264
» Comparing mathematical models on the problem of network infe...
Sort
View
NIPS
1993
15 years 6 months ago
Credit Assignment through Time: Alternatives to Backpropagation
Learning to recognize or predict sequences using long-term context has many applications. However, practical and theoretical problems are found in training recurrent neural networ...
Yoshua Bengio, Paolo Frasconi
IJON
2008
98views more  IJON 2008»
15 years 4 months ago
Factorisation and denoising of 0-1 data: A variational approach
Presence-absence (0-1) observations are special in that often the absence of evidence is not evidence of absence. Here we develop an independent factor model, which has the unique...
Ata Kabán, Ella Bingham
147
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 11 months ago
Mixed-Membership Stochastic Block-Models for Transactional Networks
Abstract: Transactional network data can be thought of as a list of oneto-many communications (e.g., email) between nodes in a social network. Most social network models convert th...
Mahdi Shafiei, Hugh Chipman
141
Voted
ASIAMS
2007
IEEE
15 years 11 months ago
Solving Shortest Capacitated Path Problem Using a Bi-Objective Heuristic Approach
The shortest capacitated path problem is a well known problem in the networking area, having a wide range of applications. In the shortest capacitated path problem, a traffic flow...
Crina Grosan, Ajith Abraham
IJSNET
2007
95views more  IJSNET 2007»
15 years 4 months ago
On extracting consistent graphs in wireless sensor networks
: Robustness and security of services like localisation, routing and time synchronisation in Wireless Sensor Networks (WSNs) have been critical issues. Efficient mathematical (gra...
Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. ...