نتایج جستجو برای: network behavior
تعداد نتایج: 1249268 فیلتر نتایج به سال:
Following brain lesions, previously normal patients sometimes exhibit criminal behavior. Although rare, these cases can lend unique insight into the neurobiological substrate of criminality. Here we present a systematic mapping of lesions with known temporal association to criminal behavior, identifying 17 lesion cases. The lesion sites were spatially heterogeneous, including the medial prefron...
The paper characterizes the field of investigations “Simulation of Adaptive Behavior” that is on the border of biology and informatics and studies architectures and informational processes of control systems that govern behavior of both animal and artificial creatures (animats). The project “Animat Brain” (a neural-network-based framework for simulation of adaptive behavior) is described. 1 Sim...
ABSTRACT This paper studies the effects of and countermeasures against adversarial behavior in network resource allocation mechanisms such as pricing and auctions. It models the heterogeneous behavior of users, which ranges from altruistic to selfish and even to malicious, using game theory. The paper adopts a mechanism design approach to quantify the effect of adversarial behavior and modify t...
On account of their role played in the fundamental biological rhythms and by considering their potential use in information processing, the dynamical properties of an artificial neural network are particularly interesting to investigate. In order to reduce the degree of complexity of this work, we have considered in this paper a fully connected neural network of two discrete neurons. We have pr...
This chapter provides an introduction into the genetic control and analysis of behavioral variation using powerful online resources. We introduce you to the new field of systems genetics using "case studies" drawn from the world of behavioral genetics that exploit populations of genetically diverse lines of mice. These lines differ very widely in patterns of gene and protein expression in the b...
Every device defines the behaviour of various applications running on it with the help of user profiles or settings. What if a user wants different different applications to run in different different networks. Then he can’t do this. Because in today’s existing operating systems the application profile, user specific tool settings and any such system usage settings do not consider the current n...
A botnet is a network of compromised hosts that fulfills the malicious intents of an attacker. Once installed, a bot is typically used to steal sensitive information, send SPAM, perform DDoS attacks, and other illegal activities. Research in botnet detection has been quite prolific in the past years, producing detection mechanisms that focus on specific command and control structures, or on the...
Milos Kudelka FEI, VSB Technical University of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba, Czech Republic [email protected] Eliska Ochodkova FEI, VSB Technical University of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba, Czech Republic [email protected] Sarka Zehnalova FEI, VSB Technical University of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba, Czech Republic sarka.zehnalov...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید