Sciweavers

1486 search results - page 257 / 298
» Firewall Rules Analysis
Sort
View
ICONIP
1998
15 years 1 months ago
Computing Iterative Roots with Neural Networks
Many real processes are composed of a n-fold repetition of some simpler process. If the whole process can be modelled with a neural network, we present a method to derive a model ...
Lars Kindermann
BDA
1997
15 years 1 months ago
A Non-Blocking Single-Phase Commit Protocol for Rigorous Participants
Transactional standards have been promoted by OMG and X/Open to allow heterogeneous resources to participate in an Atomic Commitment Protocol (ACP), namely the two-phase commit pro...
Maha Abdallah, Philippe Pucheral
NC
1998
15 years 1 months ago
An Addition to Backpropagation for Computing Functional Roots
Many processes are composed of a n-fold repetition of some simpler process. If the whole process can be modeled with a neural network, we present a method to derive a model of the...
Lars Kindermann
IJCAI
1997
15 years 1 months ago
A Music Stream Segregation System Based on Adaptive Multi-Agents
A principal problem of auditory scene analysis is stream segregation: decomposing an input acoustic signal into signals of individual sound sources included in the input. While ex...
Kunio Kashino, Hiroshi Murase
SLP
1993
110views more  SLP 1993»
15 years 1 months ago
Logic Program Specialisation With Deletion of Useless Clauses
In this paper we describe a method of programspecialisation and give an extended example of its application to specialisation of a refutation proof procedure for rst order logic. ...
D. Andre de Waal, John P. Gallagher