Sciweavers

11371 search results - page 9 / 2275
» The network inhibition problem
Sort
View
IJON
2007
96views more  IJON 2007»
14 years 11 months ago
Suppressive effects in visual search: A neurocomputational analysis of preview search
In the real world, visual information is selected over time as well as space, when we prioritise new stimuli for attention. Watson and Humphreys [Visual marking: prioritising sele...
Eirini Mavritsaki, Dietmar Heinke, Glyn W. Humphre...
ISCAS
2005
IEEE
117views Hardware» more  ISCAS 2005»
15 years 5 months ago
A VLSI model of the bat dorsal nucleus of the lateral lemniscus for azimuthal echolocation
— The dorsal nucleus of the lateral lemniscus (DNLL) is a distinct group of auditory cells that play a strategic role in azimuthal echolocation in the bat. Dominated by EI-type c...
Rock Z. Shi, Timothy K. Horiuchi
COMCOM
2006
188views more  COMCOM 2006»
14 years 11 months ago
Dynamic bandwidth allocation for QoS routing on TDMA-based mobile ad hoc networks
The paper proposes several dynamic bandwidth allocation strategies for QoS routing on TDMA-based mobile ad hoc networks. Comprehensively, these strategies are called a distributed...
Kuei-Ping Shih, Chih-Yung Chang, Yen-Da Chen, Tsun...
NN
2002
Springer
208views Neural Networks» more  NN 2002»
14 years 11 months ago
A spiking neuron model: applications and learning
This paper presents a biologically-inspired, hardware-realisable spiking neuron model, which we call the Temporal Noisy-Leaky Integrator (TNLI). The dynamic applications of the mo...
Chris Christodoulou, Guido Bugmann, Trevor G. Clar...
PERCOM
2005
ACM
15 years 11 months ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...