Sciweavers

1141 search results - page 94 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
ESANN
2006
15 years 5 months ago
On the selection of hidden neurons with heuristic search strategies for approximation
Abstract. Feature Selection techniques usually follow some search strategy to select a suitable subset from a set of features. Most neural network growing algorithms perform a sear...
Ignacio Barrio, Enrique Romero, Lluís A. Be...
135
Voted
INFOCOM
1996
IEEE
15 years 8 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
AI
2002
Springer
15 years 3 months ago
QUANTUM: A Function-Based Question Answering System
Abstract In this paper, we describe our Question Answering (QA) system called QUANTUM. The goal of QUANTUM is to find the answer to a natural language question in a large document ...
Luc Plamondon, Leila Kosseim
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
15 years 9 months ago
Properties of and improvements to time-domain dynamic thermal analysis algorithms
—Temperature has a strong influence on integrated circuit (IC) performance, power consumption, and reliability. However, accurate thermal analysis can impose high computation co...
Xi Chen, Robert P. Dick, Li Shang
SAC
2004
ACM
15 years 9 months ago
Axes-based visualizations with radial layouts
In the analysis of multidimensional data sets questions involving detection of extremal events, correlations, patterns and trends play an increasingly important role in a variety ...
Christian Tominski, James Abello, Heidrun Schumann