Sciweavers

1377 search results - page 60 / 276
» Neural Computing
Sort
View
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
GECCO
2008
Springer
261views Optimization» more  GECCO 2008»
13 years 8 months ago
SSNNS -: a suite of tools to explore spiking neural networks
We are interested in engineering smart machines that enable backtracking of emergent behaviors. Our SSNNS simulator consists of hand-picked tools to explore spiking neural network...
Heike Sichtig, J. David Schaffer, Craig B. Laramee
IJCNN
2006
IEEE
14 years 1 months ago
Modeling Cortical Maps with Feed-Backs
Abstract— High-level specification of how the brain represents and categorizes the causes of its sensory input allows to link “what is to be done” (perceptual task) with “...
Thierry Viéville, Pierre Kornprobst
ESANN
2007
13 years 9 months ago
Structured reservoir computing with spatiotemporal chaotic attractors
Abstract. We approach the themes “computing with chaos” and “reservoir computing” in a unified setting. Different neural architectures are mentioned which display chaotic...
Carlos Lourenço

Book
452views
15 years 5 months ago
Practical Artificial Intelligence Programming With Java
This book shows how to implement some AI techniques in java such as Search, Reasoning, Semantic Web, Expert Systems, Genetic Algorithms, Neural Networks, Machine Learning with Weka...
Mark Watson