Sciweavers

470 search results - page 69 / 94
» Reading a Neural Code
Sort
View
JCNS
2010
100views more  JCNS 2010»
14 years 6 months ago
Methods for predicting cortical UP and DOWN states from the phase of deep layer local field potentials
During anesthesia, slow-wave sleep and quiet wakefulness, neuronal membrane potentials collectively switch between de- and hyperpolarized levels, the cortical UP and DOWN states. P...
Aman B. Saleem, Paul Chadderton, John Apergis-Scho...
ICIP
2009
IEEE
16 years 26 days ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
OSDI
2008
ACM
16 years 3 days ago
Quanto: Tracking Energy in Networked Embedded Systems
We present Quanto, a network-wide time and energy profiler for embedded network devices. By combining well-defined interfaces for hardware power states, fast high-resolution energ...
Rodrigo Fonseca, Prabal Dutta, Philip Levis, Ion S...
EUROSYS
2006
ACM
15 years 9 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
ICDM
2009
IEEE
105views Data Mining» more  ICDM 2009»
15 years 6 months ago
Multi-document Summarization by Information Distance
—We are now living in a world where information is growing and updating quickly. Knowledge can be acquired more efficiently with the help of automatic document summarization and...
Chong Long, Minlie Huang, Xiaoyan Zhu, Ming Li