Sciweavers

10396 search results - page 1797 / 2080
» Deployment Support Network
Sort
View
COMCOM
2000
105views more  COMCOM 2000»
15 years 4 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
CN
2002
110views more  CN 2002»
15 years 4 months ago
Evaluation of mobility and quality of service interaction
With the fast adoption of IP-based communications for mobile computing, users are expecting a similar service in wireless and wired networks. This raises the need for setting guar...
Jukka Manner, Alberto López Toledo, Andrej ...
ECCC
2000
158views more  ECCC 2000»
15 years 4 months ago
On the Computational Power of Winner-Take-All
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
Wolfgang Maass
NN
2000
Springer
137views Neural Networks» more  NN 2000»
15 years 4 months ago
Evolutionary robots with on-line self-organization and behavioral fitness
We address two issues in Evolutionary Robotics, namely the genetic encoding and the performance criterion, also known as fitness function. For the first aspect, we suggest to enco...
Dario Floreano, Joseba Urzelai
IJON
2002
154views more  IJON 2002»
15 years 4 months ago
Nonlinear model predictive control of a cutting process
Nonlinear model predictive control (MPC) of a simulated chaotic cutting process is presented. The nonlinear MPC combines a neural-network model and a genetic-algorithm-based optim...
Primoz Potocnik, Igor Grabec
« Prev « First page 1797 / 2080 Last » Next »