Sciweavers

2200 search results - page 221 / 440
» Hop Integrity in Computer Networks
Sort
View
SECON
2007
IEEE
15 years 10 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
ICTAI
2006
IEEE
15 years 10 months ago
Belief Update in Bayesian Networks Using Uncertain Evidence
This paper reports our investigation on the problem of belief update in Bayesian networks (BN) using uncertain evidence. We focus on two types of uncertain evidences, virtual evid...
Rong Pan, Yun Peng, Zhongli Ding
ICNC
2009
Springer
15 years 8 months ago
Knowledge Acquisition Approach Based on Rough Set and Artificial Neural Network in Product Design Process
In this paper, product structure is taken as knowledge acquisition point, and the effective knowledge acquisition path is discussed by establishing the associated relationship bet...
Changfeng Yuan, Wanlei Wang, Yan Chen
142
Voted
DL
1999
Springer
154views Digital Library» more  DL 1999»
15 years 8 months ago
SOMLib: A Digital Library System Based on Neural Networks
Digital Libraries have gained tremendous interest with numerous research projects addressing the wealth of challenges in this field. While computational intelligence systems are ...
Andreas Rauber, Dieter Merkl
AES
2007
Springer
78views Cryptology» more  AES 2007»
15 years 4 months ago
Reliability and performance-based design by artificial neural network
Whilst conventional approach in structural design is based on reliability-calibrated factored design formula, performance-based design customizes a solution to the specific circum...
K. W. Chau