Sciweavers

321 search results - page 18 / 65
» Testing protocols modeled as FSMs with timing parameters
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
Extensions of recurrent neural network language model
We present several modifications of the original recurrent neural network language model (RNN LM). While this model has been shown to significantly outperform many competitive l...
Tomas Mikolov, Stefan Kombrink, Lukas Burget, Jan ...
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 5 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
170
Voted
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 3 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
COMCOM
2010
167views more  COMCOM 2010»
15 years 1 months ago
Effective load for flow-level performance modelling of file transfers in wireless LANs
Today, a wide range of 802.11-based Wireless LANs (WLANs) have become dominant to provide wireless Internet access for file transfers. For engineering purposes, there is a need fo...
Geert Jan Hoekstra, Robert D. van der Mei
IJON
2007
79views more  IJON 2007»
15 years 3 months ago
Predicting neuronal activity with simple models of the threshold type: Adaptive Exponential Integrate-and-Fire model with two co
An adaptive Exponential Integrate-and-Fire (aEIF) model was used to predict the activity of layer-V-pyramidal neurons of rat neocortex under random current injection. A new protoc...
Claudia Clopath, Renaud Jolivet, Alexander Rauch, ...