Sciweavers

4052 search results - page 46 / 811
» Using RDF to describe networks
Sort
View
ICRA
2005
IEEE
155views Robotics» more  ICRA 2005»
14 years 3 months ago
CPG Design using Inhibitory Networks
– We describe in detail the behavior of an inhibitory Central Pattern Generator (CPG) network for robot control. A four-neuron, mutual inhibitory network forms the basic coordina...
M. Anthony Lewis, Francesco Tenore, Ralph Etienne-...
ACSAC
2000
IEEE
14 years 2 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
IJNSEC
2010
66views more  IJNSEC 2010»
13 years 4 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
SGAI
2004
Springer
14 years 3 months ago
Resource Allocation in Communication Networks Using Market-Based Agents
This work describes a system that allocates end-to-end bandwidth, in a switched meshed communications network. The solution makes use of market-based software agents that compete ...
Nadim Haque, Nicholas R. Jennings, Luc Moreau
FUZZY
1997
Springer
260views Fuzzy Logic» more  FUZZY 1997»
14 years 2 months ago
Forecasting Sales Using Neural Networks
Abstract. In this paper, neural networks trained with the back-propagation algorithm are applied to predict the future values of time series that consist of the weekly demand on it...
Frank M. Thiesing, Oliver Vornberger