Sciweavers

619 search results - page 24 / 124
» On computational limitations of neural network architectures
Sort
View
COMSWARE
2007
IEEE
14 years 1 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
ESANN
2007
13 years 9 months ago
Structured reservoir computing with spatiotemporal chaotic attractors
Abstract. We approach the themes “computing with chaos” and “reservoir computing” in a unified setting. Different neural architectures are mentioned which display chaotic...
Carlos Lourenço
AES
2008
Springer
133views Cryptology» more  AES 2008»
13 years 7 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
ACS
2004
13 years 7 months ago
A Categorical Approach to Threshold Agent Networks
Threshold agent networks (TANs) constitute a discretized modification of threshold (also known as neural) networks that are appropriate for modeling computer simulations. In this p...
George Voutsadakis
WSC
2000
13 years 9 months ago
Model abstraction for discrete event systems using neural networks and sensitivity information
STRACTION FOR DISCRETE EVENT SYSTEMS USING NEURAL NETWORKS AND SENSITIVITY INFORMATION Christos G. Panayiotou Christos G. Cassandras Department of Manufacturing Engineering Boston ...
Christos G. Panayiotou, Christos G. Cassandras, We...