Sciweavers

118 search results - page 21 / 24
» Two k-winners-take-all networks with discontinuous activatio...
Sort
View
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 5 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
CN
2008
76views more  CN 2008»
14 years 11 months ago
Efficient path protection in bi-directional WDM systems
Bi-directional WDM transmission is a technique that allows data to be transmitted simultaneously in both directions of a fiber, with different sets of wavelength channels for each...
Ji Li, Kwan L. Yeung, Chun-Kit Chan
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
15 years 5 months ago
Hand Force Estimation using Electromyography Signals
— In many studies and applications that include direct human involvement such as human-robot interaction, control of prosthetic arms, and human factor studies, hand force is need...
Farid Mobasser, Keyvan Hashtrudi-Zaad
BMCBI
2007
121views more  BMCBI 2007»
14 years 11 months ago
A procedure for identifying homologous alternative splicing events
Background: The study of the functional role of alternative splice isoforms of a gene is a very active area of research in biology. The difficulty of the experimental approach (in...
David Talavera, Adam Hospital, Modesto Orozco, Xav...
NN
2000
Springer
170views Neural Networks» more  NN 2000»
14 years 11 months ago
Synthetic brain imaging: grasping, mirror neurons and imitation
The article contributes to the quest to relate global data on brain and behavior (e.g. from PET, Positron Emission Tomography, and fMRI, functional Magnetic Resonance Imaging) to ...
Michael A. Arbib, Aude Billard, Marco Iacoboni, Er...