Sciweavers

683 search results - page 92 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
IJCNN
2007
IEEE
15 years 7 months ago
System Identification for the Hodgkin-Huxley Model using Artificial Neural Networks
— A single biological neuron is able to perform complex computations that are highly nonlinear in nature, adaptive, and superior to the perceptron model. A neuron is essentially ...
Manish Saggar, Tekin Meriçli, Sari Andoni, ...
104
Voted
TWC
2008
238views more  TWC 2008»
15 years 18 days ago
Downlink resource allocation in multi-carrier systems: frequency-selective vs. equal power allocation
In this paper, a dynamic subcarrier and power allocation problem is considered in the context of asymptotic utility maximization in multi-carrier systems. Using the gradient-based...
Hyang-Won Lee, Song Chong
100
Voted
CGF
2008
137views more  CGF 2008»
15 years 25 days ago
The Visual Computing of Projector-Camera Systems
This state-of-the-art report focuses on real-time image correction techniques that enable projector-camera systems to display images onto screens that are not optimized for projec...
Oliver Bimber, Daisuke Iwai, Gordon Wetzstein, Ans...
ASPDAC
2007
ACM
136views Hardware» more  ASPDAC 2007»
15 years 4 months ago
Design tool solutions for mixed-signal/RF circuit design in CMOS nanometer technologies
The scaling of CMOS technology into the nanometer era enables the fabrication of highly integrated systems, which increasingly contain analog and/or RF parts. However, scaling into...
Georges G. E. Gielen
IWNAS
2008
IEEE
15 years 7 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen