Sciweavers

5234 search results - page 805 / 1047
» Simulation of Computer Network Attacks
Sort
View
126
Voted
IPTPS
2003
Springer
15 years 9 months ago
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Abstract—Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general concerns over the cost of maintaining the...
Ratul Mahajan, Miguel Castro, Antony I. T. Rowstro...
IWCMC
2010
ACM
15 years 9 months ago
Turbo packet combining techniques for multi-relay-assisted systems over multi-antenna broadband channels
This paper focuses on turbo packet combining techniques for multi-relay-assisted systems operating over multiple-input multiple-output (MIMO) broadband channel. Two packet combini...
Houda Chafnaji, Halim Yanikomeroglu, Tarik Ait-Idi...
IJCNN
2000
IEEE
15 years 9 months ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta
IWANN
1999
Springer
15 years 8 months ago
Pattern Recognition System with Top-Down Process of Mental Rotation
A new model which can recognize rotated, distorted, scaled, shifted and noised patterns is proposed. The model is constructed based on psychological experiments in a mental rotatio...
Shunji Satoh, Hirotomo Aso, Shogo Miyake, Jousuke ...
SEAL
1998
Springer
15 years 8 months ago
Robust Evolution Strategies
This paper empirically investigates the use and behaviour of Evolution Strategies (ES) algorithms on problems such as function optimisation and the use of evolutionary artificial ...
Kazuhiro Ohkura, Yoshiyuki Matsumura, Kanji Ueda