Sciweavers

1566 search results - page 41 / 314
» Contification Using Dominators
Sort
View
GLOBECOM
2007
IEEE
15 years 4 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
ICANN
2010
Springer
14 years 10 months ago
Action Classification in Soccer Videos with Long Short-Term Memory Recurrent Neural Networks
Abstract. In this paper, we propose a novel approach for action classification in soccer videos using a recurrent neural network scheme. Thereby, we extract from each video action ...
Moez Baccouche, Franck Mamalet, Christian Wolf, Ch...
AML
2005
82views more  AML 2005»
14 years 9 months ago
The canonical function game
The canonical function game is a game of length 1 introduced by W. Hugh Woodin which falls inside a class of games known as Neeman games. Using large cardinals, we show that it is...
Paul B. Larson
70
Voted
CORR
2004
Springer
121views Education» more  CORR 2004»
14 years 9 months ago
Solving Elliptic Finite Element Systems in Near-Linear Time with Support Preconditioners
We consider linear systems arising from the use of the finite element method for solving a certain class of linear elliptic problems. Our main result is that these linear systems, ...
Erik G. Boman, Bruce Hendrickson, Stephen A. Vavas...
TNN
1998
111views more  TNN 1998»
14 years 9 months ago
Asymptotic distributions associated to Oja's learning equation for neural networks
— In this paper, we perform a complete asymptotic performance analysis of the stochastic approximation algorithm (denoted subspace network learning algorithm) derived from Oja’...
Jean Pierre Delmas, Jean-Francois Cardos