Sciweavers

1737 search results - page 272 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ESANN
2007
15 years 3 months ago
A hierarchical model for syllable recognition
Inspired by recent findings on the similarities between the primary auditory and visual cortex we propose a neural network for speech recognition based on a hierarchical feedforw...
Xavier Domont, Martin Heckmann, Heiko Wersing, Fra...
CPAIOR
2009
Springer
15 years 9 months ago
Optimal Interdiction of Unreactive Markovian Evaders
The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdi...
Alexander Gutfraind, Aric A. Hagberg, Feng Pan
JSAC
2010
122views more  JSAC 2010»
15 years 27 days ago
A hybrid reservation/contention-based MAC for video streaming over wireless networks
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
TNN
1998
96views more  TNN 1998»
15 years 2 months ago
Noise suppressing sensor encoding and neural signal orthonormalization
In this paper we regard first the situation where parallel channels are disturbed by noise. With the goal of maximal information conservation we deduce the conditions for a transf...
Rüdiger W. Brause, M. Rippl
DGO
2007
168views Education» more  DGO 2007»
15 years 3 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...