Sciweavers

954 search results - page 55 / 191
» From brains to bytes
Sort
View
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
15 years 2 months ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks
JCNS
2010
81views more  JCNS 2010»
14 years 8 months ago
Sensory information in local field potentials and spikes from visual and auditory cortices: time scales and frequency bands
Studies analyzing sensory cortical processing or trying to decode brain activity often rely on a combination of different electrophysiological signals, such as local field potentia...
Andrei Belitski, Stefano Panzeri, Cesare Magri, Ni...
ICIP
2002
IEEE
15 years 11 months ago
Analysis of blood vessel topology by cubical homology
In this note, we segment and topologically classify brain vessel data obtained from magnetic resonance angiography (MRA). The segmentation is done adaptively and the classificatio...
Konstantin Mischaikow, Pawel Pilarczyk, William D....
ISBI
2004
IEEE
15 years 10 months ago
Cortical Surface Parameterization by P-Harmonic Energy Minimization
Cortical surface parameterization has several applications in visualization and analysis of the brain surface. Here we propose a scheme for parameterizing the surface of the cereb...
Anand A. Joshi, Richard M. Leahy, Paul M. Thompson...
BC
2005
65views more  BC 2005»
14 years 10 months ago
A field-theoretic approach to understanding scale-free neocortical dynamics
Amesoscopicfield-theoreticapproachiscompared with neural network and brain imaging approaches to understanding brain dynamics. Analysis of high spatiotemporal resolution rabbit ele...
Walter J. Freeman