Sciweavers

13180 search results - page 2490 / 2636
» Network Models
Sort
View
CORR
2007
Springer
143views Education» more  CORR 2007»
15 years 3 months ago
On Myopic Sensing for Multi-Channel Opportunistic Access
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu
ISI
2006
Springer
15 years 3 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JIKM
2008
98views more  JIKM 2008»
15 years 3 months ago
Knowledge-Based Expert System Development and Validation with Petri Nets
Expert systems (ESs) are complex information systems that are expensive to build and difficult to validate. Numerous knowledge representation strategies such as rules, semantic net...
Madjid Tavana
136
Voted
JMLR
2008
141views more  JMLR 2008»
15 years 3 months ago
Accelerated Neural Evolution through Cooperatively Coevolved Synapses
Many complex control problems require sophisticated solutions that are not amenable to traditional controller design. Not only is it difficult to model real world systems, but oft...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
JCM
2006
112views more  JCM 2006»
15 years 3 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
« Prev « First page 2490 / 2636 Last » Next »