Sciweavers

13631 search results - page 2696 / 2727
» Event-Based Performance Analysis
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 7 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 7 months ago
Interference Channel with an Out-of-Band Relay
A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system i...
Onur Sahin, Osvaldo Simeone, Elza Erkip
NAR
2007
124views more  NAR 2007»
13 years 7 months ago
EVEREST: a collection of evolutionary conserved protein domains
Protein domains are subunits of proteins that recur throughout the protein world. There are many definitions attempting to capture the essence of a protein domain, and several sys...
Elon Portugaly, Nathan Linial, Michal Linial
NECO
2007
150views more  NECO 2007»
13 years 7 months ago
Reinforcement Learning, Spike-Time-Dependent Plasticity, and the BCM Rule
Learning agents, whether natural or artificial, must update their internal parameters in order to improve their behavior over time. In reinforcement learning, this plasticity is ...
Dorit Baras, Ron Meir
PAMI
2007
133views more  PAMI 2007»
13 years 7 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
« Prev « First page 2696 / 2727 Last » Next »