Sciweavers

11716 search results - page 2096 / 2344
» Computable symbolic dynamics
Sort
View
82
Voted
CORR
2007
Springer
120views Education» more  CORR 2007»
15 years 20 days ago
On the Feedback Capacity of Power Constrained Gaussian Noise Channels with Memory
—For a stationary additive Gaussian-noise channel with a rational noise power spectrum of a finite-order L, we derive two new results for the feedback capacity under an average ...
Shaohua Yang, Aleksandar Kavcic, Sekhar Tatikonda
IJRR
2006
76views more  IJRR 2006»
15 years 20 days ago
From Robots to Animals: Virtual Fences for Controlling Cattle
We consider the problem of monitoring and controlling the position of herd animals, and view animals as agents with natural mobility but not strictly controllable. By exploiting k...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
IJSN
2006
140views more  IJSN 2006»
15 years 20 days ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
74
Voted
JCNS
2008
58views more  JCNS 2008»
15 years 20 days ago
The role of synaptic facilitation in spike coincidence detection
Using a realistic model of activity dependent dynamical synapse, which includes both depressing and facilitating mechanisms, we study the conditions in which a postsynaptic neuron...
Jorge F. Mejías, Joaquín J. Torres
117
Voted
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
15 years 20 days ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
« Prev « First page 2096 / 2344 Last » Next »