default search action
CISDA 2015: Verona, NY, USA
- 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2015, Verona, NY, USA, May 26-28, 2015. IEEE 2015, ISBN 978-1-4673-7557-3
- Joshua Reynolds, Lauren A. Christopher, Russ Eberhart, Patrick Shaffer:
Using computational swarm intelligence for real-time asset allocation. 1-5 - Richard Loe, Christopher Maracchion, Andrew L. Drozd:
Semi-autonomous management of multiple ad-hoc teams of UAVs. 1-4 - Boris Kovalerchuk, Leonid I. Perlovsky:
Rigorous sensor resource management: Methodology and evolutionary optimization. 1-8 - Gopi Vinod Avvari, David Sidoti, Manisha Mishra, Lingyi Zhang, Bala Kishore Nadella, Krishna R. Pattipati, James A. Hansen:
Dynamic asset allocation for counter-smuggling operations under disconnected, intermittent and low-bandwidth environment. 1-6 - Colin Donahue, Cory E. Merkel, Qutaiba Saleh, Levs Dolgovs, Yu Kee Ooi, Dhireesha Kudithipudi, Bryant T. Wysocki:
Design and analysis of neuromemristive echo state networks with limited-precision synapses. 1-6 - Qutaiba Saleh, Cory E. Merkel, Dhireesha Kudithipudi, Bryant T. Wysocki:
Memristive computational architecture of an echo state network for real-time speech-emotion recognition. 1-5 - Harika Manem, Karsten Beckmann, Min Xu, Robert Carroll, Robert E. Geer, Nathaniel C. Cady:
An extendable multi-purpose 3D neuromorphic fabric using nanoscale memristors. 1-8 - Hai (Helen) Li, Chenchen Liu, Bonan Yan, Chaofei Yang, Linghao Song, Zheng Li, Yiran Chen, Weijie Zhu, Qing Wu, Hao Jiang:
Spiking-based matrix computation by leveraging memristor crossbar array. 1-4 - Ashwin E. Amanna, Daniel Ali, David Gonzalez Fitch, Jeffrey H. Reed:
Design of experiments based empirical models to support cognitive radio decision making. 1-7 - Jithin Jagannath, Hanne M. Saarinen, Andrew L. Drozd:
Framework for automatic signal classification techniques (FACT) for software defined radios. 1-7 - Matthew Kane, Daniel Bennett:
Detecting Push to Talk radios using two tone intermodulation distortion. 1-7 - J. David Schaffer:
Evolving spiking neural networks: A novel growth algorithm corrects the teacher. 1-8 - Chenyuan Zhao, Wafi Danesh, Bryant T. Wysocki, Yang Yi:
Neuromorphic encoding system design with chaos based CMOS analog neuron. 1-6 - Ziqian Liu:
Risk sensitive optimal synchronization of coupled stochastic neural networks with chaotic phenomena. 1-7 - Gustave Anderson, David J. Dorsey:
Ternary trust metric for mobile ad-hoc networks. 1-9 - Laurent Yamen Njilla, Niki Pissinou:
Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach. 1-6 - Eray Balkanli, Nur Zincir-Heywood:
Highlights on analyzing one-way traffic using different tools. 1-8 - Sheng Miao, Robert J. Hammell II, Ziying Tang, Timothy P. Hanratty, John Dumer, John T. Richardson:
Integrating complementary/contradictory information into fuzzy-based VoI determinations. 1-7 - Alireza Goudarzi, Alireza Shabani, Darko Stefanovic:
Exploring transfer function nonlinearity in echo state networks. 1-8 - Wafi Danesh, Chenyuan Zhao, Bryant T. Wysocki, Michael J. Medley, Ngwe Thawdar, Yang Yi:
Channel estimation in wireless OFDM systems using reservoir computing. 1-5 - Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis. 1-8 - Georgiy Levchuk, Erik Blasch:
Probabilistic graphical models for multi-source fusion from text sources. 1-10 - Carlo Schäfer:
Detection of compromised email accounts used for spamming in correlation with mail user agent access activities extracted from metadata. 1-6 - Hong Zhao, Kevin A. Kwiat, Charles A. Kamhoua, Manuel Rodríguez:
Applying chaos theory for runtime Hardware Trojan detection. 1-6 - Kevin Nelson, George Corbin, Mark Anania, Matthew Kovacs, Jeremy Tobias, Misty K. Blowers:
Evaluating model drift in machine learning algorithms. 1-8 - Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Stéphane Gagnon:
A trace abstraction approach for host-based anomaly detection. 1-8 - Hiren Patel:
Non-parametric feature generation for RF-fingerprinting on ZigBee devices. 1-5 - Balakumar Balasingam, Krishna R. Pattipati, Georgiy M. Levchuk, John C. Romano:
Robust collaborative learning by multi-agents. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.