Sciweavers

1534 search results - page 122 / 307
» networks 2011
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
A demonstration of PyViz, a flexible smart home visualization tool
—As smart home technologies continue to be deployed in research and real world environments, there continues to be a need for quality visualization of the smart home data. This d...
Brian L. Thomas, Aaron S. Crandall
ANOR
2011
96views more  ANOR 2011»
14 years 11 months ago
Global propagation of side constraints for solving over-constrained problems
This article deals with the resolution of over-constrained problems using constraint programming, which often imposes to add to the constraint network new side constraints. These ...
Thierry Petit, Emmanuel Poder
COGSR
2011
99views more  COGSR 2011»
14 years 11 months ago
A biologically realistic cleanup memory: Autoassociation in spiking neurons
Methods for cleaning up (or recognizing) states of a neural network are crucial for the functioning of many neural cognitive models. For example, Vector Symbolic Architectures pro...
Terrence C. Stewart, Yichuan Tang, Chris Eliasmith
ICONFERENCE
2011
14 years 11 months ago
Finding social roles in Wikipedia
: The concept of "social role" has long been used in social science describe the intersection of behavioral, meaningful, and structural attributes that emerge regularly i...
Howard T. Welser, Dan Cosley, Gueorgi Kossinets, A...
IJNSEC
2011
116views more  IJNSEC 2011»
14 years 11 months ago
An Authentication Protocol Based on Kerberos 5
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak...
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama S. ...