Sciweavers

335 search results - page 44 / 67
» Control patterns in a healthcare network
Sort
View
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
IJON
2002
120views more  IJON 2002»
13 years 7 months ago
The recognition and analysis of animate objects using neural networks and active contour models
: In this paper we describe a method for tracking walking humans in the visual field. Active contour models are used to track moving objects in a sequence of images. The resulting ...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George
ADHOCNOW
2005
Springer
14 years 1 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
GECCO
2008
Springer
161views Optimization» more  GECCO 2008»
13 years 9 months ago
An evolutionary design technique for collective communications on optimal diameter-degree networks
Scheduling collective communications (CC) in networks based on optimal graphs and digraphs has been done with the use of the evolutionary techniques. Inter-node communication patt...
Jirí Jaros, Vaclav Dvorak
JNW
2007
90views more  JNW 2007»
13 years 7 months ago
A Traveling Wave based Communication Mechanism for Wireless Sensor Networks
Abstract— In this paper, we propose and evaluate a selforganizing communication mechanism for wireless sensor networks where a large number of sensor nodes are deployed. To accom...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...