Sciweavers

2311 search results - page 326 / 463
» Robustness and Generalization
Sort
View
168
Voted
WCNC
2010
IEEE
15 years 8 months ago
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks
—The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general c...
Yasser Gadallah, Mariam Jaafari
GECCO
2007
Springer
182views Optimization» more  GECCO 2007»
15 years 8 months ago
Stochastic training of a biologically plausible spino-neuromuscular system model
A primary goal of evolutionary robotics is to create systems that are as robust and adaptive as the human body. Moving toward this goal often involves training control systems tha...
Stanley Phillips Gotshall, Terence Soule
GI
2009
Springer
15 years 8 months ago
Parallelised Gaussian Mixture Filtering for Vehicular Traffic Flow Estimation
: Large traffic network systems require handling huge amounts of data, often distributed over a large geographical region in space and time. Centralised processing is not then the ...
Lyudmila Mihaylova, Amadou Gning, Viktor Doychinov...
149
Voted
ICASSP
2009
IEEE
15 years 8 months ago
A tempering approach for Itakura-Saito non-negative matrix factorization. With application to music transcription
In this paper we are interested in non-negative matrix factorization (NMF) with the Itakura-Saito (IS) divergence. Previous work has demonstrated the relevance of this cost functi...
Nancy Bertin, Cédric Févotte, Roland...
153
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...