Sciweavers

173 search results - page 30 / 35
» Hierarchy and information in feedforward networks
Sort
View
SACMAT
2003
ACM
15 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ISSA
2004
14 years 11 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
IDA
2009
Springer
15 years 4 months ago
Learning Natural Image Structure with a Horizontal Product Model
We present a novel extension to Independent Component Analysis (ICA), where the data is generated as the product of two submodels, each of which follow an ICA model, and which comb...
Urs Köster, Jussi T. Lindgren, Michael Gutman...
NN
2006
Springer
100views Neural Networks» more  NN 2006»
14 years 10 months ago
Perceiving the unusual: Temporal properties of hierarchical motor representations for action perception
Recent computational approaches to action imitation have advocated the use of hierarchical representations in the perception and imitation of demonstrated actions. Hierarchical re...
Yiannis Demiris, Gavin Simmons
SECURWARE
2008
IEEE
15 years 4 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...