Sciweavers

7504 search results - page 162 / 1501
» Computing with Action Potentials
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 6 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
APCSAC
2006
IEEE
14 years 2 months ago
Reliable Systolic Computing Through Redundancy
The systolic array paradigm has low communication demand because it does not use costly global communication and each processor communicates with few other processors. It is thus s...
Kunio Okuda, Siang Wun Song, Marcos Tatsuo Yamamot...
ANTS
2008
Springer
110views Algorithms» more  ANTS 2008»
13 years 10 months ago
Computing Hilbert Class Polynomials
We present and analyze two algorithms for computing the Hilbert class polynomial HD. The first is a p-adic lifting algorithm for inert primes p in the order of discriminant D < ...
Juliana Belding, Reinier Bröker, Andreas Enge...
ATAL
2008
Springer
13 years 10 months ago
Computer science and game theory
Game theory has been playing an increasingly visible role in computer science, in areas as diverse as artificial intelligence, theory, and distributed systems, among others. I tak...
Yoav Shoham
ICCV
2001
IEEE
14 years 10 months ago
Multi-Agent Event Recognition
This paper presents a new approachto recognizingmultiagent events observed by a static camera. To track objects robustly, knowledgeabout the groundplaneand the events is used. An ...
Somboon Hongeng, Ramakant Nevatia