The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an implantable neural recording IC with a unique scheme for detecting spike signals and preserving their waveform in real-time. Each channel in the proposed device has a delta modulator that stores a series of consecutive subtracted signal values. The delta modulation doesn't only allow low-voltage operation by reducing the signal dynamic range, but also detects only the spike signal by...
To reduce network energy consumption without losing system performance is a key technique in 5th generation wireless communication systems. The on-off control in multi base stations scenario is proved a mixed dynamic integer programming problem and is hard to be solved. In this work, we provide a novel energy aware dynamic on-off control method in multi-base station scenario to tackle this problem...
Transparent computing separates computation and storage in different machines with a storage virtualization mechanism. In existing implementation, the user operating system needs to be modified to achieve storage virtualization. This paper presents a virtual machine-based network storage system for transparent computing, which uses a virtualized device model in service operating system to redirect...
The goal for video game AI (artificial intelligence) is to generate AI that is at appropriate challenge level. Most existing game AI is implemented by FSM (Finite State Machine) which has drawbacks in the three respects: requirement of designer's intensive participation; can't adjust strategies or difficulty dynamically; no planning and looking forward. Contribution of this paper is to propose DDA...
Intrusion detection systems (IDSs) are increasingly a key part of systems defense. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. Recently applying artificial intelligence, machine learning and data mining techniques to IDS are increasing. Artificial intelligence plays a driving role in security services. This paper proposes an Immune based...
Today's best-effort Internet with "one fits all" principle comes to an impasse. Addressed to different QoS requirements of today's network services, we propose a QoS oriented Network Architecture that bases on network virtualization. It provides multiple virtual networks deploying on the same substrate, each is designed with a special designing goal and is running a customized protocol....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.