Sciweavers

4511 search results - page 706 / 903
» Observation Based System Security
Sort
View
156
Voted
NECO
2010
147views more  NECO 2010»
15 years 2 months ago
Connectivity, Dynamics, and Memory in Reservoir Computing with Binary and Analog Neurons
Abstract: Reservoir Computing (RC) systems are powerful models for online computations on input sequences. They consist of a memoryless readout neuron which is trained on top of a ...
Lars Büsing, Benjamin Schrauwen, Robert A. Le...
137
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Frequency-Domain Oversampling for Zero-Padded OFDM in Underwater Acoustic Communications
Although time-domain oversampling of the received baseband signal is common for single-carrier transmissions, the counterpart of frequency-domain oversampling is rarely used for mu...
Zhaohui Wang, Shengli Zhou, Georgios B. Giannakis,...
165
Voted
RTAS
2011
IEEE
14 years 6 months ago
Maximizing Contention-Free Executions in Multiprocessor Scheduling
—It is widely assumed that scheduling real-time tasks becomes more difficult as their deadlines get shorter. With deadlines shorter, however, tasks potentially compete less with...
Jinkyu Lee, Arvind Easwaran, Insik Shin
141
Voted
CSCW
2012
ACM
13 years 11 months ago
Setting the stage for interaction: a tablet application to augment group discussion in a seminar class
We present a tablet-based system to collaboratively track discussion topics and ideas in a seminar-style discussion classroom. Each student uses his or her own tablet to share tex...
Drew Harry, Eric Gordon, Chris Schmandt
POPL
2006
ACM
16 years 3 months ago
Verifying properties of well-founded linked lists
We describe a novel method for verifying programs that manipulate linked lists, based on two new predicates that characterize reachability of heap cells. These predicates allow re...
Shuvendu K. Lahiri, Shaz Qadeer