Sciweavers

5056 search results - page 237 / 1012
» Network Coding Theory
Sort
View
123
Voted
IWANN
2001
Springer
15 years 7 months ago
Verifying Properties of Neural Networks
In the beginning of nineties, Hava Siegelmann proposed a new computational model, the Artificial Recurrent Neural Network (ARNN), and proved that it could perform hypercomputation....
Pedro Rodrigues, José Félix Costa, H...
OGAI
1993
15 years 7 months ago
Combining Neural Networks and Fuzzy Controllers
Fuzzy controllers are designed to work with knowledge in the form of linguistic control rules. But the translation of these linguistic rules into the framework of fuzzy set theory ...
Detlef Nauck, Frank Klawonn, Rudolf Kruse
164
Voted
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 10 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 10 months ago
Understanding Development and Usage of Social Networking Sites: The Social Software Performance Model
Social networking sites such as MySpace and Facebook thrive on energetic social interaction, but the factors that assure this are not well understood. There is a lack of theory th...
Catherine Dwyer, Starr Roxanne Hiltz, George Widme...
136
Voted
APIN
2010
172views more  APIN 2010»
15 years 3 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...