Sciweavers

796 search results - page 120 / 160
» Spoofing prevention method
Sort
View
ICANN
2010
Springer
13 years 11 months ago
Empirical Analysis of the Divergence of Gibbs Sampling Based Learning Algorithms for Restricted Boltzmann Machines
Abstract. Learning algorithms relying on Gibbs sampling based stochastic approximations of the log-likelihood gradient have become a common way to train Restricted Boltzmann Machin...
Asja Fischer, Christian Igel
GECCO
2008
Springer
113views Optimization» more  GECCO 2008»
13 years 11 months ago
Genetic programming based automatic gait generation for quadruped robots
This paper introduces a new approach to develop a fast gait for quadruped robot using genetic programming (GP). Several recent approaches have focused on the genetic algorithm (GA...
Kisung Seo, Soohwan Hyun
CAD
2008
Springer
13 years 10 months ago
Towards flattenable mesh surfaces
In many industries, products are constructed by assembled surface patches in 3, where each patch is expected to have an isometric map to a corresponding region in 2. The widely in...
Charlie C. L. Wang
ECR
2006
107views more  ECR 2006»
13 years 10 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti