A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mits...
A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mitsuo Kawato F1 Precise recruitment of spiking output at theta frequencies requires dendritic h-channels in multi-compartment models of oriens-lacunosum/moleculare hippocampal interneurons Vladislav Sekulić, Frances K. Skinner F2 Kernel methods in reconstruction of current sources from extracellular potentials for single cells and the whole brains Daniel K. Wójcik, Chaitanya Chintaluri, Dorottya Cserpán, Zoltán Somogyvári F3 The synchronized periods depend on intracellular transcriptional repression mechanisms in circadian clocks. Jae Kyoung Kim, Zachary P. Kilpatrick, Matthew R. Bennett, Kresimir Josić O1 Assessing irregularity and coordination of spiking-bursting rhythms in central pattern generators Irene Elices, David Arroyo, Rafael Levi, Francisco B. Rodriguez, Pablo Varona O2 Regulation of top-down processing by cortically-projecting parvalbumin positive neurons in basal forebrain Eunjin Hwang, Bowon Kim, Hio-Been Han, Tae Kim, James T. McKenna, Ritchie E. Brown, Robert W. McCarley, Jee Hyun Choi O3 Modeling auditory stream segregation, build-up and bistability James Rankin, Pamela Osborn Popp, John Rinzel O4 Strong competition between tonotopic neural ensembles explains pitch-related dynamics of auditory cortex evoked fields Alejandro Tabas, André Rupp, Emili Balaguer-Ballester O5 A simple model of retinal response to multi-electrode stimulation Matias I. Maturana, David B. Grayden, Shaun L. Cloherty, Tatiana Kameneva, Michael R. Ibbotson, Hamish Meffin O6 Noise correlations in V4 area correlate with behavioral performance in visual discrimination task Veronika Koren, Timm Lochmann, Valentin Dragoi, Klaus Obermayer O7 Input-location dependent gain modulation in cerebellar nucleus neurons Maria Psarrou, Maria Schilstra, Neil Davey, Benjamin Torben-Ni
Based on the centralized channel allocation strategy in the Cognitive Radio networks, considering the opportunistic channel access for Secondary Users, a discretetime queueing model with a general transmission time an...
详细信息
Complex network analysis method has recently been proposed to solve the problem of contact prediction in Delay Tolerant networks(DTNs).Centrality Estimation remains as an important issue in such *** schemes such as si...
详细信息
ISBN:
(纸本)9781467356985
Complex network analysis method has recently been proposed to solve the problem of contact prediction in Delay Tolerant networks(DTNs).Centrality Estimation remains as an important issue in such *** schemes such as single window and cumulative window centrality estimation,however,can not predict the node contact capability accurately due to the fact that the messages always have a specific lifetime associated with *** this paper we proposes a new centrality estimation method based on simplified Hidden Markov Model(HMM) to address this *** historical and current centrality information is used to compute the comparative centrality of two encountering nodes before the expiration of a *** results based on real traces show that our approach outperforms the existing schemes in terms of estimation accuracy,leading to significant improvement on delivery efficiency.
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl...
详细信息
Most of the traditional outlier mining algorithms are not suitable for high dimensional datasets. However, the dimensionality of the dataset in the field of the Internet of Things is high. Therefore, Hypergraph-based ...
详细信息
There are two critical questions in the Wu-Huberman algorithm: one is picking two poles and the other is setting the threshold. By further studying the two questions, we present a method that makes the discovery of co...
详细信息
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illu...
详细信息
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illumination changes and the other is processing speed. In this paper, first, histograms of oriented gradient (HOG) features are extracted to resolve the problem of illumination changes. Second, AdaBoost based algorithm is used in detection phase to increase the processing speed. Finally, RBF-SVM classifier is used for recognition. Experimental results show a high detection and recognition accuracy and the processing speed is about 10 frames per second.
In the grid environment, there are a large number of grid resources scheduling algorithms. According to the existing Min-Min scheduling algorithm in uneven load, and low resource utilization rate, we put forward LoBa-...
详细信息
How to embed more secret message into Web page with keeping good imperceptibility simultaneously is a trade-off problem for information hiding schemes. This paper presents a novel Web page information hiding method ba...
详细信息
How to embed more secret message into Web page with keeping good imperceptibility simultaneously is a trade-off problem for information hiding schemes. This paper presents a novel Web page information hiding method based on three inherent features of current Web page's HTML Code matrix. This method firstly exploits chaotic transform to deal with secret message, then embeds each bit of secret message into cover Web page according to the random odevity of character amount contained by each row(column) in cover Web page's HTML code matrix. Its process is very simple to understand and easy to implement. It can improve the largest embedded capacity (LEC) of cover Web page greatly with keeping good imperceptibility at the same time. We test our approach on two test data sets which include 1000 Web pages in total. The experiment results show that the max LECs for these two data sets are up to 11291 bits and 13545 bits respectively. The average LECs for two data sets has improvement of 80.2% and 24% more than that of other Web page information hiding method .
In this study, a systematic approach to Capturing and Analysing botnets is presented. Our framework is a scalable and robust infrastructure and consists of four modules. Honeynet-based capture system is proposed that ...
详细信息
暂无评论