Sciweavers

1663 search results - page 72 / 333
» Computer Security in the Real World
Sort
View
AGI
2008
13 years 10 months ago
A computational approximation to the AIXI model
Universal induction solves in principle the problem of choosing a prior to achieve optimal inductive inference. The AIXI theory, which combines control theory and universal induct...
Sergey Pankov
SOSP
1997
ACM
13 years 10 months ago
Automated Hoarding for Mobile Computers
A common problem facing mobile computing is disconnected operation, or computing in the absence of a network. Hoarding eases disconnected operation by selecting a subset of the us...
Geoffrey H. Kuenning, Gerald J. Popek
GLOBECOM
2007
IEEE
14 years 3 months ago
Modeling MIMO-UWB OFDM systems with Computational Electromagnetics
—This paper simulates a typical indoor MIMO-UWB OFDM system using computational electromagnetics. The goal is to create a simulation using a real world environment and taking int...
Rocco Dragone, John Kountouriotis, Prathaban Mooki...
IPSN
2005
Springer
14 years 2 months ago
Experiences and directions in pushpin computing
— Over the last three years we have built and experimented with the Pushpin Computing wireless sensor network platform. The Pushpin platform is a tabletop multihop wireless senso...
Joshua Lifton, Michael Broxton, Joseph A. Paradiso
ESANN
2001
13 years 10 months ago
A computational model of monkey grating cells for oriented repetitive alternating patterns
In 1992 neurophysiologists [5] found an new type of cells in areas V1 and V2 of the monkey primary visual cortex, which they called grating cells. These cells respond vigorously to...
Tino Lourens, Kazuhiro Nakadai, Hiroshi G. Okuno, ...