Sciweavers

34181 search results - page 182 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
IEEEARES
2006
IEEE
15 years 4 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
PVLDB
2008
103views more  PVLDB 2008»
14 years 9 months ago
A request-routing framework for SOA-based enterprise computing
Enterprises may use a service-oriented architecture (SOA) to provide a streamlined interface to their business processes. To scale up the system, each tier in a composite service ...
Thomas Phan, Wen-Syan Li
NECO
2010
147views more  NECO 2010»
14 years 8 months ago
Connectivity, Dynamics, and Memory in Reservoir Computing with Binary and Analog Neurons
Abstract: Reservoir Computing (RC) systems are powerful models for online computations on input sequences. They consist of a memoryless readout neuron which is trained on top of a ...
Lars Büsing, Benjamin Schrauwen, Robert A. Le...
IJKESDP
2011
107views more  IJKESDP 2011»
14 years 1 months ago
Creating singing vocal expressions by means of interactive evolutionary computation
—Today, researches for singing by computer have attracted attention. VOCALOID1 is an application to realize that aim. By inputing lyrics and melody, users can make songs sung by ...
Akio Watanabe, Hitoshi Iba
MOBISYS
2003
ACM
15 years 10 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...