Sciweavers

7536 search results - page 1497 / 1508
» Localized Components Analysis
Sort
View
NECO
2007
150views more  NECO 2007»
13 years 9 months ago
Reinforcement Learning, Spike-Time-Dependent Plasticity, and the BCM Rule
Learning agents, whether natural or artificial, must update their internal parameters in order to improve their behavior over time. In reinforcement learning, this plasticity is ...
Dorit Baras, Ron Meir
NAR
2008
122views more  NAR 2008»
13 years 9 months ago
PlantTFDB: a comprehensive plant transcription factor database
Transcription factors (TFs) play key roles in controlling gene expression. Systematic identification and annotation of TFs, followed by construction of TF databases may serve as u...
Anyuan Guo, Xin Chen, Ge Gao, He Zhang, Qihui Zhu,...
CIKM
2010
Springer
13 years 8 months ago
Predicting product adoption in large-scale social networks
Online social networks offer opportunities to analyze user behavior and social connectivity and leverage resulting insights for effective online advertising. We study the adopti...
Rushi Bhatt, Vineet Chaoji, Rajesh Parekh
IJCV
2010
194views more  IJCV 2010»
13 years 8 months ago
Extended Phase Field Higher-Order Active Contour Models for Networks - Its Application to Road Network Extraction from VHR Satel
This paper addresses the segmentation from an image of entities that have the form of a ‘network’, i.e. the region in the image corresponding to the entity is composed of bran...
Ting Peng, Ian H. Jermyn, Véronique Prinet,...
INFOCOM
2010
IEEE
13 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
« Prev « First page 1497 / 1508 Last » Next »