Sciweavers

4511 search results - page 823 / 903
» Observation Based System Security
Sort
View
NN
2002
Springer
208views Neural Networks» more  NN 2002»
14 years 9 months ago
A spiking neuron model: applications and learning
This paper presents a biologically-inspired, hardware-realisable spiking neuron model, which we call the Temporal Noisy-Leaky Integrator (TNLI). The dynamic applications of the mo...
Chris Christodoulou, Guido Bugmann, Trevor G. Clar...
ECCC
2010
98views more  ECCC 2010»
14 years 8 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
COMPLEX
2009
Springer
15 years 4 months ago
Evolution of the Internet AS-Level Ecosystem
— We seek a simple model that describes how market forces acting on rational players result in the evolution of the multi-faceted topology of the Internet that we see today. We m...
Srinivas Shakkottai, Marina Fomenkov, Ryan Koga, D...
BIOWIRE
2007
Springer
15 years 4 months ago
User-Centric Mobility Models for Opportunistic Networking
Abstract. In this chapter we survey the most recent proposals for modelling user mobility in mobile pervasive networks, and specifically in opportunistic networks. We identify two...
Chiara Boldrini, Marco Conti, Andrea Passarella
ICWS
2004
IEEE
14 years 11 months ago
WSIP - Web Service SIP Endpoint for Converged Multimedia/Multimodal Communication over IP
We present an approach for converged communication services over IP, based on the concept of WSIP (Web Service SIP). In our approach, each WSIP node is both a SIP endpoint that co...
Feng Liu, Wu Chou, Li Li, J. Jenny Li