Sciweavers

2715 search results - page 386 / 543
» Network bucket testing
Sort
View
143
Voted
NIPS
2007
15 years 4 months ago
Theoretical Analysis of Learning with Reward-Modulated Spike-Timing-Dependent Plasticity
Reward-modulated spike-timing-dependent plasticity (STDP) has recently emerged as a candidate for a learning rule that could explain how local learning rules at single synapses su...
Robert A. Legenstein, Dejan Pecevski, Wolfgang Maa...
108
Voted
CGVR
2006
15 years 4 months ago
Remote Move-Related Operation Awareness in Real-Time Internet-Based Collaborative Graphics Design Systems
Supporting awareness of other cooperators is an idea that holds promise for improving the usability of real-time distributed collaborative graphics design systems. However, networ...
Bo Jiang, Jianxv Yang
CSREASAM
2004
15 years 4 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
ICVGIP
2004
15 years 4 months ago
Efficient Identification Based on Human Iris Patterns
This paper proposes a person identification system (PID), which works with non-illumination low-resolution eye images. Radial-Scan and threshold methods are used for Iris normaliz...
A. Chitra, R. Bremananth
112
Voted
EUSFLAT
2001
125views Fuzzy Logic» more  EUSFLAT 2001»
15 years 4 months ago
Computational intelligence approaches for parametric estimation and feature extraction of power spectral density
This paper reports an early progress of a feasibility study of a computational intelligence approach to the enhancement of the accuracy of flow measurements in the framework of a ...
Da Ruan, Davide Roverso, Paolo F. Fantoni