Skip to main content
Displaying 1611 - 1620 of 47506

Neural network memories with storage prescriptions based on Hebb's rule are known to collapse as more words are stored.

A given rational transfer-function T(s) of a passive network, which is real for real s, is to be realized by an inductorless two-port.

The Euclidean Steiner minimal tree problem is known to be an NP-complete problem and current algorithms cannot solve problems with more than thirty points.

We consider a three-tiered digital switching hierarchy where traffic from remote users is grouped, concentrated into multiple time-multiplex lines, and then transmitted to a central location for in

In this paper we aim to solve the problem of the tolerance of composite pipes to end defects.

This paper presents the architecture of a DSP dedicated to discrete wavelet transform.

Through the study of a linear problem, this paper introduces some of the ingredients that are needed in order to conduct efficient non-linear calculations on composite pipes under thermo-mechanical

A CCD spot survey of 12 random high galactic latitude fields in three bands is discussed, and deep images of each field are shown. 19,800 galaxies are found in the survey.

Analyzing non-labeled data is a major concern in the field of intrusion detection as the attack clusters are continuously evolving which are unknown for the system.

Network Function Virtualization (NFV) and service orchestration simplify the deployment and management of network and telecommunication services.

Explore more

Video

Nokia Bell Labs celebrates 100 years of innovation