Sciweavers

17185 search results - page 3381 / 3437
» Computational and Quantitative Studies
Sort
View
IJET
2007
121views more  IJET 2007»
14 years 9 months ago
A Technology Based Program That Matches Enrichment Resources With Student Strengths
Remarkable advances in instructional communication technology (ICT) have now made is possible to provide high levels of enrichment and the kinds of curricular differentiation that...
Joseph S. Renzulli, Sally M. Reis
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
ALIFE
2005
14 years 9 months ago
Transient Phenomena in Learning and Evolution: Genetic Assimilation and Genetic Redistribution
Deacon has recently proposed that complexes of genes can be integrated into functional groups as a result of environmental changes that mask and unmask selection pressures. For exa...
Janet Wiles, James Watson, Bradley Tonkes, Terrenc...
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
14 years 9 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
IJON
2007
88views more  IJON 2007»
14 years 9 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
« Prev « First page 3381 / 3437 Last » Next »