Sciweavers

4498 search results - page 784 / 900
» How to Invent Functions
Sort
View
149
Voted
NIPS
2004
15 years 4 months ago
Maximising Sensitivity in a Spiking Network
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
Anthony J. Bell, Lucas C. Parra
139
Voted
NIPS
2004
15 years 4 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
117
Voted
WSC
2004
15 years 4 months ago
Speech Acts of War
This research investigates Speech Acts performed in the war film Platoon. It aims at finding details about the types of speech acts, their form and how they are expressed by the i...
John David Salt
121
Voted
DYNAMO
2000
87views more  DYNAMO 2000»
15 years 4 months ago
Derive: a tool that automatically reverse-engineers instruction encodings
Many binary tools, such as disassemblers, dynamiccode generation systems, and executable code rewriters, need to understand how machine instructions are encoded. Unfortunately, sp...
Dawson R. Engler, Wilson C. Hsieh
147
Voted
WSC
1998
15 years 4 months ago
Applying Temporal Databases to HLA Data Collection and Analysis
The High Level Architecture (HLA) for distributed simulations was proposed by the Defense Modeling and Simulation Office of the Department of Defense (DOD) in order to support int...
Thom McLean, Leo Mark, Margaret L. Loper, David Ro...