Sciweavers

2211 search results - page 165 / 443
» Robustness of Model-Based Simulations
Sort
View
130
Voted
ESANN
2007
15 years 5 months ago
Intrinsic plasticity for reservoir learning algorithms
One of the most difficult problems in using dynamic reservoirs like echo state networks for signal processing is the choice of reservoir network parameters like connectivity or spe...
Marion Wardermann, Jochen J. Steil
122
Voted
RSS
2007
138views Robotics» more  RSS 2007»
15 years 5 months ago
Planning and Control of Meso-scale Manipulation Tasks with Uncertainties
— We develop a systematic approach to incorporating uncertainty into planning manipulation tasks with frictional contacts. We consider the canonical problem of assembling a peg i...
Peng Cheng, David J. Cappelleri, Bogdan Gavrea, Vi...
131
Voted
CSREASAM
2004
15 years 5 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
134
Voted
CSDA
2008
158views more  CSDA 2008»
15 years 3 months ago
Outlier identification in high dimensions
A computationally fast procedure for identifying outliers is presented, that is particularly effective in high dimensions. This algorithm utilizes simple properties of principal c...
Peter Filzmoser, Ricardo A. Maronna, Mark Werner
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Dependable k-coverage algorithms for sensor networks
– Redundant sensing capabilities are often required in sensor network applications due to various reasons, e.g. robustness, fault tolerance, or increased accuracy. At the same ti...
Simon Gyula, Miklós Molnár, Lá...