Sciweavers

988 search results - page 150 / 198
» Intrusion Detection with Neural Networks
Sort
View
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
13 years 3 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
ICA
2004
Springer
14 years 1 months ago
Improving GRNNs in CAD Systems
Different Computer Aided Diagnosis (CAD) systems have been recently developed to detect microcalcifications (MCs) in digitalized mammography, among other techniques, applying Gen...
Fulgencio S. Buendía Buendía, J. Mig...
IWANN
2001
Springer
14 years 13 days ago
A Realistic Computational Model of the Local Circuitry of the Cuneate Nucleus
Abstract. Intracellular recordings obtained under cutaneous and lemniscal stimulation show that the afferent fibers can establish excitatory and inhibitory synaptic connections w...
Eduardo Sánchez Vila, Senén Barro, J...
IJCNN
2000
IEEE
14 years 12 days ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta
MVA
1994
145views Computer Vision» more  MVA 1994»
13 years 9 months ago
Machine Vision Based Inspection of Textile Fabrics
Several issues on automatic inspection of textile fabrics are discussed in this paper. To avoid the intense computation for real time inspection, we suggest a parallel pyramid har...
Chuanjun Wang, Chih-Ho Yu