Sciweavers

2924 search results - page 495 / 585
» On the Use of Evidence in Neural Networks
Sort
View
IJCAI
2007
15 years 3 months ago
A Fully Connectionist Model Generator for Covered First-Order Logic Programs
We present a fully connectionist system for the learning of first-order logic programs and the generation of corresponding models: Given a program and a set of training examples,...
Sebastian Bader, Pascal Hitzler, Steffen Höll...
NIPS
1997
15 years 3 months ago
Computing with Action Potentials
Most computational engineering based loosely on biology uses continuous variables to represent neural activity. Yet most neurons communicate with action potentials. The engineerin...
John J. Hopfield, Carlos D. Brody, Sam T. Roweis
BMCBI
2006
181views more  BMCBI 2006»
15 years 1 months ago
The comprehensive updated regulatory network of Escherichia coli K-12
Background: Escherichia coli is the model organism for which our knowledge of its regulatory network is the most extensive. Over the last few years, our project has been collectin...
Heladia Salgado, Alberto Santos-Zavaleta, Socorro ...
DAS
2006
Springer
15 years 3 months ago
Extraction and Analysis of Document Examiner Features from Vector Skeletons of Grapheme 'th'
Abstract. This paper presents a study of 25 structural features extracted from samples of grapheme `th' that correspond to features commonly used by forensic document examiner...
Vladimir Pervouchine, Graham Leedham
CCS
2006
ACM
15 years 5 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen