Sciweavers

1609 search results - page 120 / 322
» Problem Structure and Dependable Architecture
Sort
View
88
Voted
ICAISC
2004
Springer
15 years 6 months ago
Visualization of Hidden Node Activity in Neural Networks: II. Application to RBF Networks
Scatterograms of the images of training set vectors in the hidden space help to evaluate the quality of neural network mappings and understand internal representations created by t...
Wlodzislaw Duch
96
Voted
ASAP
1997
IEEE
139views Hardware» more  ASAP 1997»
15 years 4 months ago
Buffer size optimization for full-search block matching algorithms
This paper presents how to find optimized buffer size for VLSI architectures of full-search block matching algorithms. Starting from the DG (dependency graph) analysis, we focus i...
Yuan-Hau Yeh, Chen-Yi Lee
119
Voted
ICPADS
2005
IEEE
15 years 6 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
113
Voted
IMCSIT
2010
14 years 9 months ago
Solving a Kind of BVP for ODEs on heterogeneous CPU + CUDA-enabled GPU Systems
The aim of this paper is to show that a special kind of boundary value problem for second-order ordinary differential equations which reduces to the problem of solving a tridiagona...
Przemyslaw Stpiczynski, Joanna Potiopa
111
Voted
ECSQARU
1999
Springer
15 years 4 months ago
A Critique of Inductive Causation
: In this paper we consider the problem of inducing causal relations from statistical data. Although it is well known that a correlation does not justify the claim of a causal rela...
Christian Borgelt, Rudolf Kruse