Sciweavers

589 search results - page 97 / 118
» Accurate Dependability Analysis of CAN-Based Networked Syste...
Sort
View
CCR
2004
151views more  CCR 2004»
15 years 1 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
TIT
2002
164views more  TIT 2002»
15 years 1 months ago
On the generalization of soft margin algorithms
Generalization bounds depending on the margin of a classifier are a relatively recent development. They provide an explanation of the performance of state-of-the-art learning syste...
John Shawe-Taylor, Nello Cristianini
INFOCOM
2002
IEEE
15 years 6 months ago
How to market-manage a QoS network
This paper describes a control mechanism for a future Internet. It is an economic mechanism that enables users to choose different pairs of price/QoS priority levels for network se...
Jörn Altmann, Huw Oliver, Hans Daanen, Alfons...
NN
2010
Springer
225views Neural Networks» more  NN 2010»
15 years 9 days ago
Learning to imitate stochastic time series in a compositional way by chaos
This study shows that a mixture of RNN experts model can acquire the ability to generate sequences that are combination of multiple primitive patterns by means of self-organizing ...
Jun Namikawa, Jun Tani
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
13 years 4 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su