Sciweavers

2899 search results - page 465 / 580
» Engineering Optimization Using a Simple Evolutionary Algorit...
Sort
View
NECO
2010
154views more  NECO 2010»
14 years 11 months ago
Role of Homeostasis in Learning Sparse Representations
Neurons in the input layer of primary visual cortex in primates develop edge-like receptive fields. One approach to understanding the emergence of this response is to state that ...
Laurent U. Perrinet
103
Voted
TASLP
2010
82views more  TASLP 2010»
14 years 7 months ago
Psychoacoustically Constrained and Distortion Minimized Speech Enhancement
Abstract--This paper considers a psychoacoustically constrained and distortion minimized speech enhancement algorithm. Noise reduction, in general, leads to speech distortion, and ...
Seokhwan Jo, Chang D. Yoo
121
Voted
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
15 years 21 days ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
226
Voted
CC
2009
Springer
190views System Software» more  CC 2009»
16 years 1 months ago
SSA Elimination after Register Allocation
form uses a notational abstractions called -functions. These instructions have no analogous in actual machine instruction sets, and they must be replaced by ordinary instructions ...
Fernando Magno Quintão Pereira, Jens Palsbe...
99
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...