Sciweavers

1265 search results - page 8 / 253
» Finding the Key to a Synapse
Sort
View
ITCC
2005
IEEE
14 years 1 months ago
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography
1 Table lookups are one of the most frequently-used operations in symmetric-key ciphers. Particularly in the newer algorithms such as the Advanced Encryption Standard (AES), we fr...
A. Murat Fiskiran, Ruby B. Lee
ICONFERENCE
2011
13 years 2 months ago
Finding social roles in Wikipedia
: The concept of "social role" has long been used in social science describe the intersection of behavioral, meaningful, and structural attributes that emerge regularly i...
Howard T. Welser, Dan Cosley, Gueorgi Kossinets, A...
FCCM
2009
IEEE
147views VLSI» more  FCCM 2009»
13 years 11 months ago
FPGA Accelerated Simulation of Biologically Plausible Spiking Neural Networks
Artificial neural networks are a key tool for researchers attempting to understand and replicate the behaviour and intelligence found in biological neural networks. Software simul...
David Thomas, Wayne Luk
NIPS
2004
13 years 9 months ago
Reducing Spike Train Variability: A Computational Theory Of Spike-Timing Dependent Plasticity
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron ...
Sander M. Bohte, Michael C. Mozer
JCNS
2008
117views more  JCNS 2008»
13 years 7 months ago
Dendritic action potentials connect distributed dendrodendritic microcircuits
Lateral inhibition of cells surrounding an excited area is a key property of sensory systems, sharpening the preferential tuning of individual cells in the presence of closely rela...
Michele Migliore, Gordon M. Shepherd