Sciweavers

559 search results - page 92 / 112
» Neural methods for non-standard data
Sort
View
ECRIME
2007
15 years 5 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
NIPS
2007
15 years 3 months ago
An online Hebbian learning rule that performs Independent Component Analysis
Independent component analysis (ICA) is a powerful method to decouple signals. Most of the algorithms performing ICA do not consider the temporal correlations of the signal, but o...
Claudia Clopath, André Longtin, Wulfram Ger...
EUSFLAT
2001
108views Fuzzy Logic» more  EUSFLAT 2001»
15 years 3 months ago
Intelligent modelling of the indoor climate in buildings by soft computing
The paper considers the application of soft computing techniques for predictive modelling in the built sector. TakagiSugeno fuzzy models are built by subtractive clustering to pro...
Alexander Gegov
IMAGING
2004
15 years 3 months ago
Maintaining an Accurate Printer Characterization
In this study, the problem of updating a printer characterization in response to systematic changes in print-device characteristics is addressed with two distinct approaches: the ...
David Littlewood, Ganesh Subbarayan
NIPS
2000
15 years 3 months ago
Finding the Key to a Synapse
Experimental data have shown that synapses are heterogeneous: different synapses respond with different sequences of amplitudes of postsynaptic responses to the same spike train. ...
Thomas Natschläger, Wolfgang Maass