咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 15 册 图书

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 24 篇 计算机科学与技术...
    • 21 篇 电气工程
    • 9 篇 控制科学与工程
  • 20 篇 理学
    • 20 篇 物理学

主题

  • 13 篇 artificial intel...
  • 10 篇 theory of comput...
  • 9 篇 machine learning
  • 5 篇 computer communi...
  • 5 篇 computer system ...
  • 5 篇 special purpose ...
  • 5 篇 mathematics of c...
  • 4 篇 pattern recognit...
  • 3 篇 intrusion detect...
  • 3 篇 information syst...
  • 3 篇 simulation and m...
  • 3 篇 mathematical log...
  • 3 篇 data mining and ...
  • 3 篇 computer applica...
  • 3 篇 security
  • 3 篇 neural network
  • 3 篇 classification
  • 3 篇 computation by a...
  • 3 篇 image processing...
  • 2 篇 cyber security

机构

  • 4 篇 huazhong univers...
  • 4 篇 edinburgh napier...
  • 3 篇 robert gordon un...
  • 2 篇 shenzhen institu...
  • 2 篇 university of gr...
  • 2 篇 central south un...
  • 2 篇 school of electr...
  • 2 篇 wuhan university
  • 2 篇 king fahd univer...
  • 2 篇 rochester inst t...
  • 2 篇 the university o...
  • 2 篇 anhui university
  • 1 篇 departament d’en...
  • 1 篇 department of co...
  • 1 篇 faculty of agric...
  • 1 篇 school of inform...
  • 1 篇 suny binghamton ...
  • 1 篇 21ct inc austin ...
  • 1 篇 college of compu...
  • 1 篇 next generat sys...

作者

  • 4 篇 linqiang pan
  • 3 篇 jianqing lin
  • 3 篇 amir hussain
  • 3 篇 jinchang ren
  • 2 篇 chenglong li
  • 2 篇 shuqiang wang
  • 2 篇 de-shuang huang
  • 2 篇 sarah l. thomson
  • 2 篇 mufti mahmud
  • 2 篇 pablo garcía-sán...
  • 2 篇 pino robinson e.
  • 2 篇 aihua zheng
  • 2 篇 erfu yang
  • 2 篇 bo jiang
  • 2 篇 zhi gao
  • 2 篇 mugan jonathan
  • 2 篇 kudithipudi dhir...
  • 2 篇 zhicheng zhao
  • 2 篇 emma hart
  • 2 篇 lianghao li

语言

  • 45 篇 英文
  • 1 篇 中文
检索条件"任意字段=Conference on Machine Intelligence and Bio-inspired Computation - Theory and Applications VIII"
45 条 记 录,以下是1-10 订阅
排序:
machine intelligence and bio-inspired computation: theory and applications viii
Machine Intelligence and Bio-inspired Computation: Theory an...
收藏 引用
machine intelligence and bio-inspired computation: theory and applications viii
The proceedings contain 21 papers. The topics discussed include: a tale of three bio-inspired computational approaches;probabilistic graphs using coupled random variables;evaluating data distribution and drift vulnera...
来源: 评论
AHaH computing with thermodynamic RAM: bridging the technology stack
AHaH computing with thermodynamic RAM: bridging the technolo...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Nugent, Alex M Alexander Nugent Consulting Santa Fe NM 87505 USA
We introduce the motivations behind AHaH computing, an emerging new form of adaptive computing with many applications in machine learning. We then present a technology stack or specification describing the multiple le... 详细信息
来源: 评论
Intelligent Water Drops for Aerospace and Defense applications
Intelligent Water Drops for Aerospace and Defense Applicatio...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Straub, Jeremy Univ N Dakota Dept Comp Sci Grand Forks ND 58202 USA
A modified version of the intelligent water drop algorithm for performing planning for air and ground robots based on telemetry provided by satellites has been created. The IWD algorithm works by simulating the flow o... 详细信息
来源: 评论
Neuromorphic Computing applications for Network Intrusion Detection Systems
Neuromorphic Computing Applications for Network Intrusion De...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Garcia, Raymond C. Pino, Robinson E. ICF Int Fairfax VA 22031 USA
What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based net... 详细信息
来源: 评论
Heterogeneous CMOS/Memristor Hardware Neural Networks for Real-Time Target Classification
Heterogeneous CMOS/Memristor Hardware Neural Networks for Re...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Merkel, Cory Kudithipudi, Dhireesha Ptucha, Ray Rochester Inst Technol NanoComp Res Lab Rochester NY 14623 USA Rochester Inst Technol Machine Intelligence Lab Rochester NY USA
The advent of nanoscale metal-insulator-metal (MIM) structures with memristive properties has given birth to a new generation of hardware neural networks based on CMOS/memristor integration (CMHNNs). The advantage of ... 详细信息
来源: 评论
Applying hardware-based machine learning to signature-based network intrusion detection
Applying hardware-based machine learning to signature-based ...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Payer, Garrett McCormick, Chris Harang, Richard ICF Int 9300 Lee Hwy Fairfax VA 22031 USA CogniMem Technol Folsom CA 95630 USA
We present a proof-of-concept of a lightweight and low-power network intrusion detection system (NIDS) using a commercially available neural network chip. Such a system is well-suited to the increasing deployment of l... 详细信息
来源: 评论
Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments
Evaluating data distribution and drift vulnerabilities of ma...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Nelson, Kevin Corbin, George Blowers, Misty BAE Syst 581 Phoenix Dr Rome NY 13441 USA Air Force Res Lab 525 Brooks Rd Rome NY 13441 USA
machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algori... 详细信息
来源: 评论
Trusted computation through biologically inspired processes
Trusted computation through biologically inspired processes
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications VII
作者: Anderson, Gustave W. MacAulay Brown Inc MacB Roanoke VA USA
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends t... 详细信息
来源: 评论
Experimental analysis of a Lotka-Volterra neural network for classification  2
Experimental analysis of a Lotka-Volterra neural network for...
收藏 引用
conference on Next-Generation Robotics II and machine intelligence and bio-inspired computation - theory and applications IX
作者: Sukhu, Christopher L. Stanton, Joseph Aylesworth, Marc BAE Syst Intelligence & Secur Rome NY 13441 USA
An experimental study of a neural network modeled by an adaptive Lotka-Volterra system follows. With totally inhibitory connections, this system can be embedded in a simple classification network. This network is able... 详细信息
来源: 评论
The Application of Top-Down Abstraction Learning Using Prediction as a Supervisory Signal to Cyber Security
The Application of Top-Down Abstraction Learning Using Predi...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Mugan, Jonathan Khalili, Aram 21CT Inc Austin TX 78730 USA
Current computer systems are dumb automatons, and their blind execution of instructions makes them open to attack. Their inability to reason means that they don't consider the larger, constantly changing context o... 详细信息
来源: 评论