Sciweavers

2047 search results - page 359 / 410
» Pervasive Computing on Active Networks
Sort
View
IJON
2007
93views more  IJON 2007»
14 years 11 months ago
How much can we trust neural simulation strategies?
Despite a steady improvement of computational hardware, results of numerical simulation are still tightly bound to the simulation tool and strategy used, and may substantially var...
Michelle Rudolph, Alain Destexhe
TIP
2008
344views more  TIP 2008»
14 years 11 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
NN
2007
Springer
14 years 11 months ago
From memory-based decisions to decision-based movements: A model of interval discrimination followed by action selection
The interval discrimination task is a classical experimental paradigm that is employed to study working memory and decision making and typically involves four phases. First, the s...
Prashant Joshi
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
14 years 10 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
HOTNETS
2010
14 years 6 months ago
Automatic rate adaptation
Rate adaptation is a fundamental primitive in wireless networks. Since wireless channel strength varies quickly and unpredictably, senders have to constantly measure the channel a...
Aditya Gudipati, Sachin Katti