Sciweavers

NCA
2008
IEEE
14 years 12 days ago
Neurodynamic programming: a case study of the traveling salesman problem
The paper focuses on the study of solving the large-scale traveling salesman problem (TSP) based on neurodynamic programming. From this perspective, two methods, temporal differenc...
Jia Ma, Tao Yang, Zeng-Guang Hou, Min Tan, Derong ...
NCA
2008
IEEE
14 years 12 days ago
The application of ridge polynomial neural network to multi-step ahead financial time series prediction
Motivated by the slow learning properties of multilayer perceptrons (MLPs) which utilize computationally intensive training algorithms, such as the backpropagation learning algorit...
Rozaida Ghazali, Abir Jaafar Hussain, Panos Liatsi...
NCA
2008
IEEE
14 years 12 days ago
Polynomial kernel adaptation and extensions to the SVM classifier learning
Three extensions to the Kernel-AdaTron training algorithm for Support Vector Machine classifier learning are presented. These extensions allow the trained classifier to adhere more...
Ramy Saad, Saman K. Halgamuge, Jason Li
NCA
2008
IEEE
14 years 12 days ago
Improved transmission of vector quantized data over noisy channels
The conventional channel-optimized vector quantization (COVQ) is very powerful in the protection of vector quantization (VQ) data over noisy channels. However, it suffers from the ...
Chi-Sing Leung, John Sum, Herbert Chan
NCA
2008
IEEE
14 years 12 days ago
A Bradley-Terry artificial neural network model for individual ratings in group competitions
A common statistical model for paired comparisons is the Bradley-Terry model. This research re-parameterizes the Bradley-Terry model as a single-layer artificial neural network (A...
Joshua E. Menke, Tony R. Martinez
NCA
2008
IEEE
14 years 6 months ago
Persistent Logical Synchrony
Francesc D. Muñoz-Escoí, Rubé...
NCA
2008
IEEE
14 years 6 months ago
Supporting Linearizable Semantics in Replicated Databases
This paper proposes a novel database replication algorithm that offers strong consistency (linearizable semantics) and allows reads and non-conflicting writes to execute in para...
Luís Rodrigues, Nuno Carvalho, Emili Miedes
NCA
2008
IEEE
14 years 6 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...