咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 15 册 图书

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 24 篇 计算机科学与技术...
    • 21 篇 电气工程
    • 9 篇 控制科学与工程
  • 20 篇 理学
    • 20 篇 物理学

主题

  • 13 篇 artificial intel...
  • 10 篇 theory of comput...
  • 9 篇 machine learning
  • 5 篇 computer communi...
  • 5 篇 computer system ...
  • 5 篇 special purpose ...
  • 5 篇 mathematics of c...
  • 4 篇 pattern recognit...
  • 3 篇 intrusion detect...
  • 3 篇 information syst...
  • 3 篇 simulation and m...
  • 3 篇 mathematical log...
  • 3 篇 data mining and ...
  • 3 篇 computer applica...
  • 3 篇 security
  • 3 篇 neural network
  • 3 篇 classification
  • 3 篇 computation by a...
  • 3 篇 image processing...
  • 2 篇 cyber security

机构

  • 4 篇 huazhong univers...
  • 4 篇 edinburgh napier...
  • 3 篇 robert gordon un...
  • 2 篇 shenzhen institu...
  • 2 篇 university of gr...
  • 2 篇 central south un...
  • 2 篇 school of electr...
  • 2 篇 wuhan university
  • 2 篇 king fahd univer...
  • 2 篇 rochester inst t...
  • 2 篇 the university o...
  • 2 篇 anhui university
  • 1 篇 departament d’en...
  • 1 篇 department of co...
  • 1 篇 faculty of agric...
  • 1 篇 school of inform...
  • 1 篇 suny binghamton ...
  • 1 篇 21ct inc austin ...
  • 1 篇 college of compu...
  • 1 篇 next generat sys...

作者

  • 4 篇 linqiang pan
  • 3 篇 jianqing lin
  • 3 篇 amir hussain
  • 3 篇 jinchang ren
  • 2 篇 chenglong li
  • 2 篇 shuqiang wang
  • 2 篇 de-shuang huang
  • 2 篇 sarah l. thomson
  • 2 篇 mufti mahmud
  • 2 篇 pablo garcía-sán...
  • 2 篇 pino robinson e.
  • 2 篇 aihua zheng
  • 2 篇 erfu yang
  • 2 篇 bo jiang
  • 2 篇 zhi gao
  • 2 篇 mugan jonathan
  • 2 篇 kudithipudi dhir...
  • 2 篇 zhicheng zhao
  • 2 篇 emma hart
  • 2 篇 lianghao li

语言

  • 45 篇 英文
  • 1 篇 中文
检索条件"任意字段=Conference on Machine Intelligence and Bio-inspired Computation - Theory and Applications VIII"
45 条 记 录,以下是11-20 订阅
排序:
Energy-efficient STDP-based Learning Circuits with Memristor Synapses
Energy-efficient STDP-based Learning Circuits with Memristor...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Wu, Xinyu Saxena, Vishal Campbell, Kristy A. Boise State Univ Dept Elect & Comp Engn Boise ID 83725 USA
It is now accepted that the traditional von Neumann architecture, with processor and memory separation, is ill suited to process parallel data streams which a mammalian brain can efficiently handle. Moreover, research... 详细信息
来源: 评论
computational intelligence and Neuromorphic Computing Potential for Cybersecurity applications
Computational Intelligence and Neuromorphic Computing Potent...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications VII
作者: Pino, Robinson E. Shevenell, Michael J. Cam, Hasan Mouallem, Pierre Shumaker, Justin L. Edwards, Arthur H. ICF Int Baltimore MD 21202 USA
In today's highly mobile, networked, and interconnected internet world, the flow and volume of information is overwhelming and continuously increasing. Therefore, it is believed that the next frontier in technolog... 详细信息
来源: 评论
Subset selection of training data for machine learning: a situational awareness system case study  2
Subset selection of training data for machine learning: a si...
收藏 引用
conference on Next-Generation Robotics II and machine intelligence and bio-inspired computation - theory and applications IX
作者: McKenzie, M. Wong, S. C. Def Sci & Technol Org Canberra ACT Australia
Recent advances in machine learning with big data sets has allowed for significant advances in the optimisation of classification and recognition systems. However, for applications such as situational awareness system... 详细信息
来源: 评论
Optimized Hardware Framework of MLP with Random Hidden Layers for Classification applications  10
Optimized Hardware Framework of MLP with Random Hidden Layer...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications X
作者: Zyarah, Abdullah M. Ramesh, Abhishek Merkel, Cory Kudithipudi, Dhireesha Rochester Inst Technol NanoComp Res Lab Rochester NY 14623 USA Univ Baghdad Dept Elect Engn Baghdad 10071 Iraq
Multilayer Perceptron Networks with random hidden layers are very efficient at automatic feature extraction and offer significant performance improvements in the training process. They essentially employ large collect... 详细信息
来源: 评论
Comparison of Artificial intelligence Classifiers for SIP Attack Data  10
Comparison of Artificial Intelligence Classifiers for SIP At...
收藏 引用
conference on machine intelligence and bio-inspired computation - theory and applications X
作者: Safarik, Jakub Slachta, Jiri Cesnet Zspo Zikova 4 Prague 6 Czech Republic
Honeypot application is a source of valuable data about attacks on the network. We run several SIP honeypots in various computer networks, which are separated geographically and logically. Each honeypot runs on public... 详细信息
来源: 评论
machine intelligence and bio-inspired computation: theory and applications VII
Machine Intelligence and Bio-Inspired Computation: Theory an...
收藏 引用
machine intelligence and bio-inspired computation: theory and applications VII conference
The proceedings contain 11 papers. The topics discussed include: optimization of background subtraction for image enhancement;statistical recognition of 3D objects using integral imaging;spatial context for moving veh...
来源: 评论
Pattern Activity Clustering and Evaluation (PACE)
Pattern Activity Clustering and Evaluation (PACE)
收藏 引用
conference on Evolutionary and bio-inspired computation - theory and applications VI
作者: Blasch, Erik Banas, Christopher Paul, Michael Bussjager, Becky Seetharaman, Guna USAF Res Lab Informat Directorate Rome NY 13441 USA
With the vast amount of network information available on activities of people (i.e. motions, transportation routes, and site visits) there is a need to explore the salient properties of data that detect and discrimina... 详细信息
来源: 评论
Performance Evaluation and Clinical applications of 3D Plenoptic Cameras  2
Performance Evaluation and Clinical Applications of 3D Pleno...
收藏 引用
conference on Next-Generation Robotics II and machine intelligence and bio-inspired computation - theory and applications IX
作者: Decker, Ryan Shademan, Azad Opfermann, Justin Leonard, Simon Kim, Peter C. W. Krieger, Axel Childrens Natl Med Ctr Sheikh Zayed Inst Pediat Surg Innovat Washington DC 20010 USA
The observation and 3D quantification of arbitrary scenes using optical imaging systems is challenging, but increasingly necessary in many fields. This paper provides a technical basis for the application of plenoptic... 详细信息
来源: 评论
Realistic Computer Network Simulation for Network Intrusion Detection Dataset Generation  2
Realistic Computer Network Simulation for Network Intrusion ...
收藏 引用
conference on Next-Generation Robotics II and machine intelligence and bio-inspired computation - theory and applications IX
作者: Payer, Garrett ICF Int Columbia MD 21046 USA
The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the... 详细信息
来源: 评论
bio-inspired approach for intelligent Unattended Ground Sensors  2
Bio-inspired approach for intelligent Unattended Ground Sens...
收藏 引用
conference on Next-Generation Robotics II and machine intelligence and bio-inspired computation - theory and applications IX
作者: Hueber, Nicolas Raymond, Pierre Hennequin, Christophe Pichler, Alexander Perrot, Maxime Voisin, Philippe Moeglin, Jean-Pierre ELSI French German Res Inst St Louis F-68300 St Louis France
Improving the surveillance capacity over wide zones requires a set of smart battery-powered Unattended Ground Sensors capable of issuing an alarm to a decision-making center. Only high-level information has to be sent... 详细信息
来源: 评论