Sciweavers

3296 search results - page 557 / 660
» Gathercast with Active Networks
Sort
View
118
Voted
ISNN
2005
Springer
15 years 6 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
ISNN
2005
Springer
15 years 6 months ago
ICA and Committee Machine-Based Algorithm for Cursor Control in a BCI System
In recent years, brain-computer interface (BCI) technology has emerged very rapidly. Brain-computer interfaces (BCIs) bring us a new communication interface technology which can tr...
Jianzhao Qin, Yuanqing Li, Andrzej Cichocki
IWANN
2005
Springer
15 years 6 months ago
Load Forecasting Using Fixed-Size Least Squares Support Vector Machines
Based on the Nystr¨om approximation and the primal-dual formulation of Least Squares Support Vector Machines (LS-SVM), it becomes possible to apply a nonlinear model to a large sc...
Marcelo Espinoza, Johan A. K. Suykens, Bart De Moo...
WOSS
2004
ACM
15 years 6 months ago
An extensible framework for autonomic analysis and improvement of distributed deployment architectures
A distributed software system’s deployment architecture can have a significant impact on the system’s properties, which depend on various system parameters, such as network ba...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic
KBSE
2003
IEEE
15 years 6 months ago
An Approach for Tracing and Understanding Asynchronous Architectures
Applications built in a strongly decoupled, eventbased interaction style have many commendable characteristics, including ease of dynamic configuration, accommodation of platform ...
Scott A. Hendrickson, Eric M. Dashofy, Richard N. ...