Sciweavers

737 search results - page 109 / 148
» Network Structuring and Training Using Rule-Based Knowledge
Sort
View
ICITA
2005
IEEE
15 years 3 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
JAIR
2010
160views more  JAIR 2010»
14 years 8 months ago
Constructing Reference Sets from Unstructured, Ungrammatical Text
Vast amounts of text on the Web are unstructured and ungrammatical, such as classified ads, auction listings, forum postings, etc. We call such text “posts.” Despite their in...
Matthew Michelson, Craig A. Knoblock
MOBICOM
2006
ACM
15 years 3 months ago
On optimal communication cost for gathering correlated data through wireless sensor networks
In many energy-constrained wireless sensor networks, nodes cooperatively forward correlated sensed data to data sinks. In order to reduce the communication cost (e.g. overall ener...
Junning Liu, Micah Adler, Donald F. Towsley, Chun ...
82
Voted
TNN
1998
125views more  TNN 1998»
14 years 9 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin
ASC
2000
14 years 11 months ago
Extended Neural Model Predictive Control of Non-Linear Systems
A neural model-based predictive control scheme is proposed for dealing with steady-state offsets found in standard MPC schemes. This structure is based on a constrained local inst...
P. Gil, J. Henriques, A. Dourado, H. Duarte-Ramos