Sciweavers

25167 search results - page 4987 / 5034
» Parallel and Distributed Algorithms
Sort
View
126
Voted
CSREASAM
2006
15 years 3 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ICHIM
2001
190views more  ICHIM 2001»
15 years 3 months ago
Chromatic Adaptation Post-Filtering in Image Synthesis Reproduction of Ancient Building for Restoration Support
Within the field of cultural heritage restoration, experts are interested in the analysis of data describing the condition and history of ancient monuments. Data are usually distr...
Maurizio Rossi, Daniele Marini, Alessandro Rizzi
142
Voted
NIPS
2004
15 years 3 months ago
Maximising Sensitivity in a Spiking Network
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
Anthony J. Bell, Lucas C. Parra
OPODIS
2004
15 years 3 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
USENIX
2004
15 years 3 months ago
Time-based Fairness Improves Performance in Multi-Rate WLANs
The performance seen by individual clients on a wireless local area network (WLAN) is heavily influenced by the manner in which wireless channel capacity is allocated. The popular...
Godfrey Tan, John V. Guttag
« Prev « First page 4987 / 5034 Last » Next »