Sciweavers

1936 search results - page 109 / 388
» Unbundling Active Functionality
Sort
View
151
Voted
EUSFLAT
2003
130views Fuzzy Logic» more  EUSFLAT 2003»
15 years 5 months ago
Resource-allocating probabilistic neuro-fuzzy network
In this paper, an architecture of a resourceallocating learning probabilistic neural network is considered. Construction and learning algorithms are proposed. The advantages of th...
Yevgeniy Bodyanskiy, Yevgen Gorshkov, Vitaliy Kolo...
119
Voted
PUC
2006
93views more  PUC 2006»
15 years 3 months ago
Comparing end-user and intelligent remote control interface generation
Traditional remote controls typically allow users to activate functionality of a single device. Given that users activate a subset of functionality across devices to accomplish a p...
Olufisayo Omojokun, Jeffrey S. Pierce, Charles Lee...
111
Voted
NC
2002
15 years 3 months ago
Parallel evolutionary training algorithms for "hardware-friendly" neural networks
In this paper, Parallel Evolutionary Algorithms for integer weight neural network training are presented. To this end, each processor is assigned a subpopulation of potential solut...
Vassilis P. Plagianakos, Michael N. Vrahatis
123
Voted
TMI
2002
88views more  TMI 2002»
15 years 3 months ago
What is the best similarity measure for motion correction in fMRI time series?
It has been shown that the difference of squares cost function used by standard realignment packages (SPM and AIR) can lead to the detection of spurious activations, because the mo...
Luis Freire, Alexis Roche, Jean-Francois Mangin
99
Voted
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 10 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar