Uncertainty reasoning has been a challenging issue in AI and database research. During the last two decades, numerous frameworks have been proposed by extending the standard logic programming and deductive database sy...
详细信息
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron fires shortly after. The dependence of...
详细信息
ISBN:
(纸本)0262195348
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron fires shortly after. The dependence of synaptic modulation on the precise timing of the two action potentials is known as spike-timing dependent plasticity or STDP. We derive STDP from a simple computational principle: synapses adapt so as to minimize the postsynaptic neuron's variability to a given presynaptic input, causing the neuron's output to become more reliable in the face of noise. Using an entropy-minimization objective function and the biophysically realistic spike-response model of Gerstner (2001), we simulate neurophysiological experiments and obtain the characteristic STDP curve along with other phenomena including the reduction in synaptic plasticity as synaptic efficacy increases. We compare our account to other efforts to derive STDP from computational principles, and argue that our account provides the most comprehensive coverage of the phenomena. Thus, reliability of neural response in the face of noise may be a key goal of cortical adaptation.
Many large-scale scientific experiments and simulations generate very large amounts of data (on the order of terabytes to petabytes), spanning thousands of files and data sets. We have developed a software system, cal...
详细信息
Today’s scientific simulations often generate huge amounts of data for data archival, data analysis, and visualization. These data are stored in high-performance distributed storages that consist of a network-oriente...
详细信息
in this paper we consider polynomial kernel representations for behaviors. For behaviors over fields it is well-known that minimal representations, i.e. representations with minimal row degrees, are exactly those repr...
详细信息
Concurrent accesses to a file frequently occur in a distributed computing environment where a few number of network-attached servers are designated as a data storage pool and the clients are physically connected to th...
详细信息
The intricacy of real-time data service management increases mainly due to the emergence of applications operating in open and unpredictable environments, increases in software complexity, and need for performance gua...
详细信息
The GENERTIA red team uses a genetic algorithm to perform vulnerability analysis in an effort to discover holes in an intrusion detection system. This paper demonstrates how a GENERTIA blue team generates detectors to...
详细信息
ISBN:
(纸本)9781581139648
The GENERTIA red team uses a genetic algorithm to perform vulnerability analysis in an effort to discover holes in an intrusion detection system. This paper demonstrates how a GENERTIA blue team generates detectors to patch those holes discovered by the GRT, The GBT uses a novel approach to generate detectors that have different coverage in order to reduce the amount of overlap of detectors created by random generation and negative selection. Copyright 2005 ACM.
This article introduces XChange, a rule-based reactive language for the (Semantic) Web. Stressing application scenarios, it first argues that high-level reactive languages are needed for both Web and Semantic Web appl...
详细信息
暂无评论