Sciweavers

274 search results - page 25 / 55
» Network reinforcement
Sort
View
IJCNN
2000
IEEE
15 years 2 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
GECCO
2004
Springer
100views Optimization» more  GECCO 2004»
15 years 3 months ago
Transfer of Neuroevolved Controllers in Unstable Domains
In recent years, the evolution of artificial neural networks or neuroevolution has brought promising results in solving difficult reinforcement learning problems. But, like standa...
Faustino J. Gomez, Risto Miikkulainen
IJSNET
2010
317views more  IJSNET 2010»
14 years 4 months ago
MRL-CC: a novel cooperative communication protocol for QoS provisioning in wireless sensor networks
: Cooperative communications have been demonstrated to be effective in combating the multiple fading effects in wireless networks, and improving the network performance in terms of...
Xuedong Liang, Min Chen, Yang Xiao, Ilangko Balasi...
PERCOM
2009
ACM
15 years 10 months ago
Proactive and Adaptive Fuzzy Profile Control for Mobile Phones
In this paper we describe a context-sensitive way to change an active mobile phone profile. We present a method to create a proactive and adaptive phone profile control system that...
Miika Valtonen, Antti-Matti Vainio, Jukka Vanhala
ACG
2003
Springer
15 years 2 months ago
Evaluation in Go by a Neural Network using Soft Segmentation
In this article a neural network architecture is presented that is able to build a soft segmentation of a two-dimensional input. This network architecture is applied to position ev...
Markus Enzenberger