Sciweavers

148 search results - page 19 / 30
» Strong and Weak Policy Relations
Sort
View
ICONIP
2004
13 years 9 months ago
A Neural Network Model for Trace Conditioning
We studied the dynamics of a neural network which have both of recurrent excitatory and random inhibitory connections. Neurons started to become active when a relatively weak trans...
Tadashi Yamazaki, Shigeru Tanaka
UAI
2003
13 years 9 months ago
A Simple Insight into Iterative Belief Propagation's Success
In non-ergodic belief networks the posterior belief of many queries given evidence may become zero. The paper shows that when belief propagation is applied iteratively over arbitr...
Rina Dechter, Robert Mateescu
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri
EOR
2000
64views more  EOR 2000»
13 years 7 months ago
Multiobjective second order symmetric duality with cone constraints
We introduce two pairs of nondifferentiable multiobjective second order symmetric dual problems with cone constraints over arbitrary closed convex cones, which is different from th...
S. K. Mishra
AUSFORENSICS
2004
13 years 9 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot