Sciweavers

4072 search results - page 391 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
TNN
1998
111views more  TNN 1998»
15 years 4 months ago
Modular recurrent neural networks for Mandarin syllable recognition
Abstract—A new modular recurrent neural network (MRNN)based speech-recognition method that can recognize the entire vocabulary of 1280 highly confusable Mandarin syllables is pro...
Sin-Horng Chen, Yuan-Fu Liao
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 7 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
FPGA
2009
ACM
188views FPGA» more  FPGA 2009»
15 years 11 months ago
Clock power reduction for virtex-5 FPGAs
Clock network power in field-programmable gate arrays (FPGAs) is considered and two complementary approaches for clock power reduction in the Xilinx R VirtexTM -5 FPGA are presen...
Qiang Wang, Subodh Gupta, Jason Helge Anderson
154
Voted
SENSYS
2003
ACM
15 years 10 months ago
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
Sensor networks not only have the potential to change the way we use, interact with, and view computers, but also the way we use, interact with, and view the world around us. In o...
Giacomino Veltri, Qingfeng Huang, Gang Qu, Miodrag...
INFOCOM
1997
IEEE
15 years 9 months ago
Restoration Strategies and Spare Capacity Requirements in Self-Healing ATM Networks
—This paper studies the capacity and flow assignment problem arising in the design of self-healing asynchronous transfer mode (ATM) networks using the virtual path concept. The ...
Yijun Xiong, Lorne Mason