Sciweavers

1087 search results - page 136 / 218
» Generation under Space Constraints
Sort
View
112
Voted
ORL
2010
167views more  ORL 2010»
14 years 7 months ago
An embedded Markov chain approach to stock rationing
Rationing is an inventory policy that allows prioritization of demand classes. It enables the inventory system to provide higher service levels for critical demand classes. In thi...
Mehmet Murat Fadiloglu, Önder Bulut
TRIDENTCOM
2005
IEEE
15 years 6 months ago
Addressing Repeatability in Wireless Experiments using ORBIT Testbed
With the rapid growth in research activity on future wireless networking applications and protocols, experimental study and validation is becoming an increasingly important tool t...
Sachin Ganu, Haris Kremo, Richard E. Howard, Ivan ...
BIOADIT
2004
Springer
15 years 4 months ago
Biologically Plausible Speech Recognition with LSTM Neural Nets
Abstract. Long Short-Term Memory (LSTM) recurrent neural networks (RNNs) are local in space and time and closely related to a biological model of memory in the prefrontal cortex. N...
Alex Graves, Douglas Eck, Nicole Beringer, Jü...
APIN
1998
78views more  APIN 1998»
15 years 13 days ago
The Method of Assigning Incidences
Incidence calculus is a probabilistic logic in which incidences, standing for the situations in which formulae may be true, are assigned to some formulae, and probabilities are as...
Weiru Liu, David McBryan, Alan Bundy
135
Voted
SOICT
2010
14 years 7 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...