Sciweavers

20813 search results - page 317 / 4163
» Introduction to Computer Networking
Sort
View
PERCOM
2005
ACM
16 years 3 months ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...
121
Voted
ICANN
2007
Springer
15 years 9 months ago
Event Detection and Localization in Mobile Robot Navigation Using Reservoir Computing
Abstract. Reservoir Computing (RC) uses a randomly created recurrent neural network where only a linear readout layer is trained. In this work, RC is used for detecting complex eve...
Eric A. Antonelo, Benjamin Schrauwen, Xavier Dutoi...
130
Voted
IEAAIE
1998
Springer
15 years 7 months ago
Soft Computing and Hybrid AI Approaches to Intelligent Manufacturing
The application of pattern recognition (PR) techniques, artificial neural networks (ANNs), and nowadays hybrid artificial intelligence (AI) techniques in manufacturing can be regar...
Laszlo Monostori, József Hornyák, Cs...
FECS
2009
159views Education» more  FECS 2009»
15 years 1 months ago
Pair-teaching a course on Grid computing from two campuses on NCREN
- Since Fall 2004, we have been co-teaching a class on Grid computing to several NC institutions using the North Carolina Research and Education Network (NCREN). In this paper, we ...
Clayton Ferner, Barry Wilkinson
133
Voted
CISIS
2010
IEEE
15 years 10 months ago
Gene Ontology Rewritten for Computing Gene Functional Similarity
Abstract—Discovery biological organisation of the cell in modules network is a challenging task. Currently, approaches based on a controlled vocabulary, as Gene Ontology, to iden...
Alessia Visconti, Francesca Cordero, Marco Botta, ...