Sciweavers

4890 search results - page 837 / 978
» From system specifications to component behavioral models
Sort
View
MOBISYS
2004
ACM
14 years 10 months ago
NWSLite: A Light-Weight Prediction Utility for Mobile Devices
Computation off-loading, i.e., remote execution, has been shown to be effective for extending the computational power and battery life of resource-restricted devices, e.g., hand-h...
Selim Gurun, Chandra Krintz, Richard Wolski
BC
2002
193views more  BC 2002»
13 years 10 months ago
Resonant spatiotemporal learning in large random recurrent networks
Taking a global analogy with the structure of perceptual biological systems, we present a system composed of two layers of real-valued sigmoidal neurons. The primary layer receives...
Emmanuel Daucé, Mathias Quoy, Bernard Doyon
ACSAC
2004
IEEE
14 years 2 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
HRI
2006
ACM
14 years 4 months ago
Using context and sensory data to learn first and second person pronouns
We present a method of grounded word learning that is powerful enough to learn the meanings of first and second person pronouns. The model uses the understood words in an utteran...
Kevin Gold, Brian Scassellati
QOFIS
2001
Springer
14 years 2 months ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz