Sciweavers

11371 search results - page 9 / 2275
» The network inhibition problem
Sort
View
IJON
2007
96views more  IJON 2007»
13 years 7 months ago
Suppressive effects in visual search: A neurocomputational analysis of preview search
In the real world, visual information is selected over time as well as space, when we prioritise new stimuli for attention. Watson and Humphreys [Visual marking: prioritising sele...
Eirini Mavritsaki, Dietmar Heinke, Glyn W. Humphre...
ISCAS
2005
IEEE
117views Hardware» more  ISCAS 2005»
14 years 1 months ago
A VLSI model of the bat dorsal nucleus of the lateral lemniscus for azimuthal echolocation
— The dorsal nucleus of the lateral lemniscus (DNLL) is a distinct group of auditory cells that play a strategic role in azimuthal echolocation in the bat. Dominated by EI-type c...
Rock Z. Shi, Timothy K. Horiuchi
COMCOM
2006
188views more  COMCOM 2006»
13 years 8 months ago
Dynamic bandwidth allocation for QoS routing on TDMA-based mobile ad hoc networks
The paper proposes several dynamic bandwidth allocation strategies for QoS routing on TDMA-based mobile ad hoc networks. Comprehensively, these strategies are called a distributed...
Kuei-Ping Shih, Chih-Yung Chang, Yen-Da Chen, Tsun...
NN
2002
Springer
208views Neural Networks» more  NN 2002»
13 years 7 months ago
A spiking neuron model: applications and learning
This paper presents a biologically-inspired, hardware-realisable spiking neuron model, which we call the Temporal Noisy-Leaky Integrator (TNLI). The dynamic applications of the mo...
Chris Christodoulou, Guido Bugmann, Trevor G. Clar...
PERCOM
2005
ACM
14 years 7 months ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...