Sciweavers

988 search results - page 185 / 198
» Intrusion Detection with Neural Networks
Sort
View
IJCNN
2007
IEEE
14 years 2 months ago
Symmetric Kernel Detector for Multiple-Antenna Aided Beamforming Systems
— We propose a powerful symmetric kernel classifier for nonlinear detection in challenging rank-deficient multipleantenna aided communication systems. By exploiting the inheren...
Sheng Chen, Andreas Wolfgang, Chris J. Harris, Laj...
IJCNN
2006
IEEE
14 years 1 months ago
Training Coordination Proxy Agents
— Delegating the coordination role to proxy agents can improve the overall outcome of the task at the expense of cognitive overload due to switching subtasks. Stability and commi...
Myriam Abramson, William Chao, Ranjeev Mittu
IJCNN
2006
IEEE
14 years 1 months ago
P-SVM Variable Selection for Discovering Dependencies Between Genetic and Brain Imaging Data
— The joint analysis of genetic and brain imaging data is the key to understand the genetic underpinnings of brain dysfunctions in several psychiatric diseases known to have a st...
Johannes Mohr, Imke Puis, Jana Wrase, Sepp Hochrei...
ISM
2005
IEEE
91views Multimedia» more  ISM 2005»
14 years 1 months ago
Research on the Discrimination of Pornographic and Bikini Images
Our research extends the general technologies detecting pornographic images to prevent the benign images whose content is approximate with the pornographic ones from being screene...
Yushi Wang, Weiqiang Wang, Wen Gao
AADEBUG
1997
Springer
14 years 2 days ago
Modeling Intelligent System Execution as State Transition Diagrams to Support Debugging
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Adele E. Howe, Gabriel Somlo