Sciweavers

3370 search results - page 535 / 674
» Adding Networks
Sort
View
ISNN
2005
Springer
15 years 10 months ago
Application of Multi-weighted Neuron for Iris Recognition
Abstract. In this paper, from the cognition science point of view, we constructed a neuron of multi-weighted neural network, and proposed a new method for iris recognition based on...
Wenming Cao, Jianhui Hu, Gang Xiao, Shoujue Wang
134
Voted
KES
2005
Springer
15 years 10 months ago
Recognizing and Simulating Sketched Logic Circuits
This paper presents a system for recognizing sketched logic circuits in real-time and graphically simulating them afterwords. It has been developed for use in university and school...
Marcus Liwicki, Lars Knipping
NDSS
2002
IEEE
15 years 10 months ago
Implementing Pushback: Router-Based Defense Against DDoS Attacks
Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congest...
John Ioannidis, Steven M. Bellovin
INFOCOM
1996
IEEE
15 years 9 months ago
ARIES: A Rearrangeable Inexpensive Edge-Based On-Line Steiner Algorithm
In this paper, we propose and evaluate ARIES, a heuristic for updating multicast trees dynamically in large point-to-point networks. The algorithm is based on monitoring the accum...
Fred Bauer, Anujan Varma
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 9 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith