Sciweavers

42 search results - page 6 / 9
» Risk Assessment Algorithms Based on Recursive Neural Network...
Sort
View
WICON
2008
13 years 8 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
AIIA
2001
Springer
13 years 10 months ago
A New Machine Learning Approach to Fingerprint Classification
We present new fingerprint classification algorithms based on two machine learning approaches: support vector machines (SVMs), and recursive neural networks (RNNs). RNNs are traine...
Yuan Yao, Gian Luca Marcialis, Massimiliano Pontil...
IJCNN
2000
IEEE
13 years 11 months ago
EM Algorithms for Self-Organizing Maps
eresting web-available abstracts and papers on clustering: An Analysis of Recent Work on Clustering Algorithms (1999), Daniel Fasulo : This paper describes four recent papers on cl...
Tom Heskes, Jan-Joost Spanjers, Wim Wiegerinck
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ENVSOFT
2007
258views more  ENVSOFT 2007»
13 years 7 months ago
Optimal groundwater monitoring design using an ant colony optimization paradigm
Groundwater long-term monitoring (LTM) is required to assess the performance of groundwater remediation and human being health risk at post-closure sites where groundwater contami...
Yuanhai Li, Amy B. Chan Hilton