Sciweavers

1265 search results - page 7 / 253
» Finding the Key to a Synapse
Sort
View
CEAS
2006
Springer
13 years 11 months ago
Algorithmically Determining Store-and-Forward MTA Relays Using DomainKeys
Store-and-forward MTA relaying servers have frequently presented problems to various antispam techniques, such as IPbased reputation or email authentication. Algorithms that find ...
Miles Libbey, Peter Ludemann
NECO
2006
103views more  NECO 2006»
13 years 7 months ago
Optimal Spike-Timing-Dependent Plasticity for Precise Action Potential Firing in Supervised Learning
In timing-based neural codes, neurons have to emit action potentials at precise moments in time. We use a supervised learning paradigm to derive a synaptic update rule that optimi...
Jean-Pascal Pfister, Taro Toyoizumi, David Barber,...
CCGRID
2008
IEEE
14 years 2 months ago
Bad Words: Finding Faults in Spirit's Syslogs
—Accurate fault detection is a key element of resilient computing. Syslogs provide key information regarding faults, and are found on nearly all computing systems. Discovering ne...
Jon Stearley, Adam J. Oliner
FC
1999
Springer
97views Cryptology» more  FC 1999»
13 years 12 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
ICWSM
2008
13 years 9 months ago
Finding Influencers and Consumer Insights in the Blogosphere
In this paper, we attempt to specify the influencer and the influential terms in consumer package goods by using the influence diffusion model (IDM). IDM calculates the spread of ...
Naohiro Matsumura, Hikaru Yamamoto, Daisuke Tomoza...