Sciweavers

4004 search results - page 21 / 801
» How Many Packets Can We Encode
Sort
View
IJON
2002
130views more  IJON 2002»
13 years 9 months ago
Error-backpropagation in temporally encoded networks of spiking neurons
For a network of spiking neurons that encodes information in the timing of individual spike times, we derive a supervised learning rule, SpikeProp, akin to traditional errorbackpr...
Sander M. Bohte, Joost N. Kok, Johannes A. La Pout...
PERCOM
2005
ACM
14 years 9 months ago
Traditional Systems Can Work Well for Pervasive Applications. A Case Study: Plan 9 from Bell Labs Becomes Ubiquitous
There is a huge effort in ongoing research on new middleware platforms and new distributed services to support ubiquitous environments and pervasive applications. Most research pr...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
IACR
2011
158views more  IACR 2011»
12 years 9 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 4 months ago
TDM Emulation in Packet-Switched Networks
— Many network operators offer some type of tiered service, in which users may select only from a small set of service levels (tiers). In this work, we study the problem of desig...
George N. Rouskas, Nikhil Baradwaj
RTAS
1999
IEEE
14 years 2 months ago
Scalable Scheduling Support for Loss and Delay Constrained Media Streams
Real-time media servers need to service hundreds and, possibly, thousands of clients, each with their own quality of service (QoS) requirements. To guarantee such diverse QoS requ...
Richard West, Karsten Schwan, Christian Poellabaue...