Sciweavers

978 search results - page 108 / 196
» Some neural networks compute, others don't
Sort
View
AINA
2010
IEEE
14 years 8 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
AINA
2006
IEEE
14 years 11 months ago
Resources availability for Peer to Peer systems
Nowadays, Peer to Peer systems are largely studied. But in order to evaluate them in a realistic way, a better knowledge of their environments is needed. In this article we focus o...
Georges Da Costa, Corine Marchand, Olivier Richard...

Book
778views
16 years 8 months ago
Gaussian Processes for Machine Learning
"Gaussian processes (GPs) provide a principled, practical, probabilistic approach to learning in kernel machines. GPs have received increased attention in the machine-learning...
Carl Edward Rasmussen and Christopher K. I. Willia...
ITCC
2005
IEEE
15 years 3 months ago
Zonal Rumor Routing for Wireless Sensor Networks
has to be relayed to nodes interested in those events. Moreover, nodes may also generate queries to find events they are interested in. Thus there is a need to route the informatio...
Tarun Banka, Gagan Tandon, Anura P. Jayasumana
INFOCOM
2008
IEEE
15 years 4 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen