Sciweavers

PRDC
2000
IEEE
14 years 1 months ago
Intrusion Tolerant Systems
Jaynarayan H. Lala
PRDC
2000
IEEE
14 years 1 months ago
Transient errors and rollback recovery in LZ compression
This paper analyzes the data integrity of one of the most widely used lossless data compression techniques, Lempel-Ziv (LZ) compression. In this algorithm, because the data recons...
Wei-Je Huang, Edward J. McCluskey
PRDC
2000
IEEE
14 years 1 months ago
Enforcing synchronous system properties on top of timed systems
A synchronous system model is a simple yet powerful distributed system model that reduces the complexity of the design and implementation of dependable distributed applications. H...
Christof Fetzer
PRDC
2000
IEEE
14 years 1 months ago
Building dependable COTS microkernel-based systems using MAFALDA
Jean-Charles Fabre, Manuel Rodríguez, Jean ...
NEUROSCIENCE
2001
Springer
14 years 1 months ago
Locust Olfaction
During odour recognition, excitatory and inhibitory groups of neurons in the second stage of the locust olfactory system, the antennal lobe (AL), fire alternately. There is little...
David C. Sterratt
NEUROSCIENCE
2001
Springer
14 years 1 months ago
Biological Grounding of Recruitment Learning and Vicinal Algorithms in Long-Term Potentiation
Biological networks are capable of gradual learning based on observing a large number of exemplars over time as well as of rapidly memorizing specific events as a result of a sin...
Lokendra Shastri