Sciweavers

4947 search results - page 291 / 990
» Learning Module Networks
Sort
View
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 5 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
CORR
2011
Springer
182views Education» more  CORR 2011»
14 years 11 months ago
Short-Message Quantize-Forward Network Coding
—Recent work for single-relay channels shows that quantize-forward (QF) with long-message encoding achieves the same reliable rates as compress-forward (CF) with short-message en...
Gerhard Kramer, Jie Hou
IADIS
2003
15 years 5 months ago
A Web-Based Education Tool for Collaborative Learning of Assembly Programming
A visual simulator has been developed as an example of Web-based education tool, which is designed for students to understand graphically internal behavior and structure of comput...
Yoshiro Imai, Shinji Tomita
IJCNN
2006
IEEE
15 years 10 months ago
A Columnar Competitive Model with Simulated Annealing for Solving Combinatorial Optimization Problems
— One of the major drawbacks of the Hopfield network is that when it is applied to certain polytopes of combinatorial problems, such as the traveling salesman problem (TSP), the...
Eu Jin Teoh, Huajin Tang, Kay Chen Tan
FOCI
2007
IEEE
15 years 10 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe