Sciweavers

8080 search results - page 1397 / 1616
» From Computer Networks to Agent Networks
Sort
View
CISIM
2008
IEEE
15 years 11 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
IJCNN
2007
IEEE
15 years 11 months ago
Two-stage Multi-class AdaBoost for Facial Expression Recognition
— Although AdaBoost has achieved great success, it still suffers from following problems: (1) the training process could be unmanageable when the number of features is extremely ...
Hongbo Deng, Jianke Zhu, Michael R. Lyu, Irwin Kin...
IJCNN
2006
IEEE
15 years 10 months ago
An Architecture for Object-based Saccade Generation using a Biologically Inspired Self-organised Retina
— Our paper presents a fully automated computational mechanism for targeting a space-variant retina based on the highlevel visual content of a scene. Our retina’s receptive fie...
Sanjeeva Balasuriya, Paul Siebert
ASPDAC
2006
ACM
88views Hardware» more  ASPDAC 2006»
15 years 10 months ago
Equivalent circuit modeling of guard ring structures for evaluation of substrate crosstalk isolation
— A substrate-coupling equivalent circuit can be derived for an arbitrary guard ring test structure by way of F-matrix computation. The derived netlist represents a unified impe...
Daisuke Kosaka, Makoto Nagata
MOBICOM
2006
ACM
15 years 10 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
« Prev « First page 1397 / 1616 Last » Next »