Sciweavers

5234 search results - page 928 / 1047
» Simulation of Computer Network Attacks
Sort
View
135
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Nonlinear Component Analysis Based on Correntropy
Abstract— In this paper, we propose a new nonlinear principal component analysis based on a generalized correlation function which we call correntropy. The data is nonlinearly tr...
Jian-Wu Xu, Puskal P. Pokharel, António R. ...
IJCNN
2006
IEEE
15 years 9 months ago
Patterns, Hypergraphs and Embodied General Intelligence
—It is proposed that the creation of Artificial General Intelligence (AGI) at the human level and ultimately beyond is a problem addressable via integrating computer science algo...
Ben Goertzel
INFOCOM
2005
IEEE
15 years 9 months ago
Understanding XCP: equilibrium and fairness
— We prove that the XCP equilibrium solves a constrained max-min fairness problem by identifying it with the unique solution of a hierarchy of optimization problems, namely those...
Steven H. Low, Lachlan L. H. Andrew, Bartek P. Wyd...
EMSOFT
2005
Springer
15 years 9 months ago
SHIM: a deterministic model for heterogeneous embedded systems
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
Stephen A. Edwards, Olivier Tardieu
GCC
2005
Springer
15 years 9 months ago
Exploiting the Heterogeneity in Structured Peer-to-Peer Systems
The structured peer-to-peer system, which is based on the distributed hash table, offers an administration-free and fault-tolerant application-level overlay network. However, a ra...
Tongqing Qiu, Guihai Chen