Sciweavers

3004 search results - page 235 / 601
» Nonlinear Mapping Networks
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
AAAI
2006
15 years 5 months ago
A Manifold Regularization Approach to Calibration Reduction for Sensor-Network Based Tracking
The ability to accurately detect the location of a mobile node in a sensor network is important for many artificial intelligence (AI) tasks that range from robotics to context-awa...
Jeffrey Junfeng Pan, Qiang Yang, Hong Chang, Dit-Y...
ADMA
2010
Springer
264views Data Mining» more  ADMA 2010»
15 years 2 months ago
Frequent Pattern Trend Analysis in Social Networks
Abstract. This paper describes an approach to identifying and comparing frequent pattern trends in social networks. A frequent pattern trend is defined as a sequence of time-stampe...
Puteri N. E. Nohuddin, Rob Christley, Frans Coenen...
PERCOM
2005
ACM
16 years 3 months ago
Supporting Topographic Queries in a Class of Networked Sensor Systems
Topographic querying is the process of extracting data from a sensor network for understanding the graphic delineation of features of interest in a terrain. Query processing techn...
Mitali Singh, Viktor K. Prasanna
115
Voted
ISCAS
2006
IEEE
90views Hardware» more  ISCAS 2006»
15 years 10 months ago
Feature competition in a spike-based winner-take-all VLSI network
— Recurrent networks and hardware analogs that perform a winner-take-all computation have been studied extensively. This computation is rarely demonstrated in a spiking network o...
Shih-Chii Liu, Matthias Oster