Sciweavers

859 search results - page 104 / 172
» The Changing Face of Cryptography
Sort
View
IJON
2006
84views more  IJON 2006»
13 years 10 months ago
Cycle-to-cycle variability as an optimal behavioral strategy
Aplysia feeding behavior is highly variable from cycle to cycle. In some cycles, when the variability causes a mismatch between the animal's movements and the requirements of...
Vladimir Brezina, Alex Proekt, Klaudiusz R. Weiss
JNW
2006
145views more  JNW 2006»
13 years 10 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
IJCV
2007
117views more  IJCV 2007»
13 years 10 months ago
Implicit Meshes for Effective Silhouette Handling
Abstract. Using silhouettes in uncontrolled environments typically requires handling occlusions as well as changing or cluttered backgrounds, which limits the applicability of most...
Slobodan Ilic, Mathieu Salzmann, Pascal Fua
TNN
1998
92views more  TNN 1998»
13 years 9 months ago
Inductive inference from noisy examples using the hybrid finite state filter
—Recurrent neural networks processing symbolic strings can be regarded as adaptive neural parsers. Given a set of positive and negative examples, picked up from a given language,...
Marco Gori, Marco Maggini, Enrico Martinelli, Giov...
GI
2009
Springer
13 years 7 months ago
An Improved Method for creating Shared Belief in Communication Constrained Sensor Networks
: Networked systems that gather sensor data in order to react to phenomena in their surroundings are faced with a growing need for adaptive behavior to operate in dynamically chang...
Eelke van Foeken, Peter Hiemstra, Leon Kester