Sciweavers

6229 search results - page 974 / 1246
» Models of Computation for Networks on Chip
Sort
View
93
Voted
ISI
2007
Springer
15 years 6 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
91
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 6 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
ICES
2005
Springer
106views Hardware» more  ICES 2005»
15 years 6 months ago
Intrinsic Evolution of Controllable Oscillators in FPTA-2
Abstract. Simple one- and two-bit controllable oscillators were intrinsically evolved using only four cells of Field Programmable Transistor Array (FPTA-2). These oscillators can p...
Lukás Sekanina, Ricardo Salem Zebulum
ISNN
2005
Springer
15 years 6 months ago
Multiple Parameter Selection for LS-SVM Using Smooth Leave-One-Out Error
In least squares support vector (LS-SVM), the key challenge lies in the selection of free parameters such as kernel parameters and tradeoff parameter. However, when a large number ...
Liefeng Bo, Ling Wang, Licheng Jiao
99
Voted
IWANN
2005
Springer
15 years 6 months ago
Direct and Recursive Prediction of Time Series Using Mutual Information Selection
Abstract. This paper presents a comparison between direct and recursive prediction strategies. In order to perform the input selection, an approach based on mutual information is u...
Yongnan Ji, Jin Hao, Nima Reyhani, Amaury Lendasse