Sciweavers

5615 search results - page 63 / 1123
» On the Computational Capabilities of Several Models
Sort
View
TSMC
2002
134views more  TSMC 2002»
14 years 9 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
WCE
2007
14 years 11 months ago
Transformation Model Estimation for Point Matching Via Gaussian Processes
—One of main issues in point matching is the choice of the mapping function and the computation of its optimal hyperparameters. In this paper, we propose an attractive approach t...
Xin Yu, Jin-Wen Tian, Jian Liu
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
WebProfiles: A Negotiation Model for User Awareness in Personal Area Networks
Automatic adaptation of the environment to user preferences results in personalized ambients that fulfill user interaction requirements in a more suitable way. However, the proble...
Juan Ignacio Vázquez, Diego López de...
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
15 years 3 months ago
Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks
Abstract— The wireless sensor network is an emerging technology that may greatly facilitate human life by providing ubiquitous sensing, computing, and communication capability. H...
Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, Wen-Tsuen ...
TAPSOFT
1997
Springer
15 years 2 months ago
Specifying Complex and Structured Systems with Evolving Algebras
This paper presents an approach for specifying complex, structured systems with Evolving Algebras by means of aggregation and composition. Evolving algebras provide a formal method...
Wolfgang May