Sciweavers

11371 search results - page 16 / 2275
» The network inhibition problem
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...
AGI
2011
13 years 21 days ago
What Makes a Brain Smart? Reservoir Computing as an Approach for General Intelligence
Abstract. Recurrent connectivity, balanced between excitation and inhibition, is a general principle of cortical connectivity. We propose that balanced recurrence can be achieved b...
Janelle Szary, Bryan Kerster, Christopher T. Kello
NETWORKS
2007
13 years 8 months ago
Heuristic solutions for general concave minimum cost network flow problems
Dalila B. M. M. Fontes, José Fernando Gon&c...
NETWORKS
1998
13 years 8 months ago
A polynomial algorithm for the p-centdian problem on a tree
Arie Tamir, Dionisio Pérez-Brito, Jos&eacut...