Sciweavers

1414 search results - page 92 / 283
» Combining Intruder Theories
Sort
View
111
Voted
NIPS
2007
15 years 2 months ago
Contraction Properties of VLSI Cooperative Competitive Neural Networks of Spiking Neurons
A non–linear dynamic system is called contracting if initial conditions are forgotten exponentially fast, so that all trajectories converge to a single trajectory. We use contra...
Emre Neftci, Elisabetta Chicca, Giacomo Indiveri, ...
67
Voted
ECIS
2003
15 years 2 months ago
Research philosophies in the IOS adoption field
This paper pursues two objectives. First it depicts the status of research philosophies of the IOS adoption field. Second, it gives an overview of the discussions within the field...
Ramanathan Somasundaram, Jan Karlsbjerg
IJON
2006
100views more  IJON 2006»
15 years 21 days ago
Analyzing the robustness of redundant population codes in sensory and feature extraction systems
Sensory systems often use groups of redundant neurons to represent stimulus information both during transduction and population coding of features. This redundancy makes the syste...
Christopher J. Rozell, Don H. Johnson
89
Voted
CORR
1998
Springer
85views Education» more  CORR 1998»
15 years 12 days ago
The Proper Treatment of Optimality in Computational Phonology
Abstract. This paper presents a novel formalization of optimality theory. Unlike previous treatments of optimality in computational linguistics, starting with Ellison 1994, the n...
Lauri Karttunen
101
Voted
TCS
2010
14 years 11 months ago
Alternating states for dual nondeterminism in imperative programming
The refinement calculus of Back, Morgan, Morris, and others is based on monotone predicate transformers (weakest preconditions) where conjunctions stand for demonic choices betwee...
Wim H. Hesselink