Sciweavers

4079 search results - page 753 / 816
» Neural Networks
Sort
View
ACSAC
1998
IEEE
15 years 5 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
99
Voted
ICRA
1998
IEEE
141views Robotics» more  ICRA 1998»
15 years 5 months ago
On Discontinuous Human Control Strategies
Models of human control strategy (HCS), which accurately emulate dynamic human behavior, have far reaching potential in areas ranging from robotics to virtual reality to the intel...
Michael C. Nechyba, Yangsheng Xu
98
Voted
ICRA
1994
IEEE
100views Robotics» more  ICRA 1994»
15 years 4 months ago
SM2 for New Space Station Structure: Autonomous Locomotion and Teleoperation Control
The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...
Michael C. Nechyba, Yangsheng Xu
112
Voted
ISCAS
1994
IEEE
92views Hardware» more  ISCAS 1994»
15 years 4 months ago
A Study on the Stochastic Computation Using the Ratio of One Pulses and Zero Pulses
Stochastic computation uses pulse streams to represent numbers. In this paper, we have studied the novel method to implement the number system which uses the ratio of the number o...
Seung-Jai Min, Eel-Wan Lee, Soo-Ik Chae
83
Voted
CEC
2009
IEEE
15 years 4 months ago
JubiTool: Unified design flow for the Perplexus SIMD hardware accelerator
This paper presents a new unified design flow developed within the Perplexus project that aims to accelerate parallelizable data-intensive applications in the context of ubiquitous...
Olivier Brousse, Jérémie Guillot, Th...