Sciweavers

5684 search results - page 7 / 1137
» Computing with active dendrites
Sort
View
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 8 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
NIPS
2003
13 years 9 months ago
Analytical Solution of Spike-timing Dependent Plasticity Based on Synaptic Biophysics
Spike timing plasticity (STDP) is a special form of synaptic plasticity where the relative timing of post- and presynaptic activity determines the change of the synaptic weight. O...
Bernd Porr, Ausra Saudargiene, Florentin Wörg...
ICARIS
2009
Springer
14 years 2 months ago
A Sense of 'Danger' for Windows Processes
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
CEC
2008
IEEE
14 years 2 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
BMCBI
2008
82views more  BMCBI 2008»
13 years 8 months ago
Gene expression profile of peripheral blood mononuclear cells in response to HIV-VLPs stimulation
Background: Baculovirus-expressed HIV-1 Pr55gag Virus-Like Particles (HIV-VLPs) induce maturation and activation of monocyte-derived dendritic cells (MDDCs) with a production of T...
Luigi Buonaguro, Alessandro Monaco, Eleonora Aric&...