Sciweavers

1661 search results - page 210 / 333
» Real-time specification patterns
Sort
View
NIPS
1990
15 years 2 months ago
Learning to See Rotation and Dilation with a Hebb Rule
Previous work (M.I. Sereno, 1989; cf. M.E. Sereno, 1987) showed that a feedforward network with area V1-like input-layer units and a Hebb rule can develop area MT-like second laye...
Martin I. Sereno, Margaret E. Sereno
HASE
2008
IEEE
15 years 1 months ago
Randomization Based Probabilistic Approach to Detect Trojan Circuits
In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be...
Susmit Jha, Sumit Kumar Jha
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 1 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi
ENVSOFT
2008
115views more  ENVSOFT 2008»
15 years 1 months ago
Adaptive fuzzy modeling versus artificial neural networks
In this paper two areas of soft computing (fuzzy modeling and artificial neural networks) are discussed. Based on the fundamental mathematical similarity of fuzzy technique and ra...
Ralf Wieland, Wilfried Mirschel
IVS
2008
79views more  IVS 2008»
15 years 1 months ago
Scalable and interactive visual analysis of financial wire transactions for fraud detection
Large financial institutions such as Bank of America handle hundreds of thousands of wire transactions per day. Although most transactions are legitimate, these institutions have ...
Remco Chang, Alvin Lee, Mohammad Ghoniem, Robert K...