نتایج جستجو برای: like network

تعداد نتایج: 1281106  

1998
Wayne D. Grover Demetrios Stamatelakis

Cycle-oriented preconfiguration of spare capacity is a new idea for the design and operation of mesh-restorable networks. It offers a sought-after goal: to retain the capacityefficiency of a mesh-restorable network, while approaching the speed of line-switched self-healing rings. We show that through a strategy of pre-failure cross-connection between the spare links of a mesh network, it is pos...

Journal: :Progress in brain research 2008
Jun-ichi Inoue

We introduce a simple Hopfield-like cellular-network model to explain a kind of "intelligence" in plants (Trewavas, 2002), especially, the capacity of plants to act as a memory device. Following earlier observations by Indian scientist J.C. Bose (1923), we regard the plant as a network in which each of the elements is connected via negative interactions. We investigate properties of the model b...

2011
Jaymin Upadhyay Scott J. Baker Prasant Chandran Loan Miller Younglim Lee Gerard J. Marek Unal Sakoglu Chih-Liang Chin Feng Luo Gerard B. Fox Mark Day

During wakefulness and in absence of performing tasks or sensory processing, the default-mode network (DMN), an intrinsic central nervous system (CNS) network, is in an active state. Non-human primate and human CNS imaging studies have identified the DMN in these two species. Clinical imaging studies have shown that the pattern of activity within the DMN is often modulated in various disease st...

Journal: :Molecular Systems Biology 2006
Kanae Oda Hiroaki Kitano

Recognition of pathogen-associated molecular signatures is critically important in proper activation of the immune system. The toll-like receptor (TLR) signaling network is responsible for innate immune response. In mammalians, there are 11 TLRs that recognize a variety of ligands from pathogens to trigger immunological responses. In this paper, we present a comprehensive map of TLRs and interl...

Journal: :The Journal of neuroscience : the official journal of the Society for Neuroscience 2003
Aidas Alaburda Jorn Hounsgaard

Glutamate is the main excitatory transmitter in the spinal motor network. The excitation is to a large extent mediated by ionotropic receptors, but glutamate also activates metabotropic receptors. In motoneurons in spinal cord slices the activation of group I metabotropic glutamate (mGlu1) receptors leads to facilitation of CaV1.3 L-type calcium channels. Here we investigate whether this pathwa...

1997
Bruce Edmonds

The aim of this paper is to describe a simple extension of semantic nets. In this formulation we have labelled nodes with directed arcs, but the directed arcs can lead to other arcs as well as nodes. In this model contexts are not differentiated as special objects, but rather that some nodes to a greater or lesser extent have roles as encoders of contextual information. This formulation is show...

Journal: :Revista Colombiana de Computación 2005
Awadhesh Kumar Singh Umesh Ghanekar Anup Kumar Bandyopadhyay

The paper aims at providing a formal system, motivated by Dijkstra’s weakest precondition logic, for specifying mobile network. The paper shows how mobility can be specified using a state and transition based approach, which allows mobile hosts to be treated as nodes in a traditional statically structured distributed system. Another goal is to reason formally about the possible behaviors of a s...

2018
Marina Jeaneth Machicao Edilson Anselmo Corrêa Júnior Gisele Helena Barboni Miranda Diego R. Amancio Odemir Martinez Bruno

The authorship attribution is a problem of considerable practical and technical interest. Several methods have been designed to infer the authorship of disputed documents in multiple contexts. While traditional statistical methods based solely on word counts and related measurements have provided a simple, yet effective solution in particular cases; they are prone to manipulation. Recently, tex...

2009
Hans J Herrmann Christian M Schneider André A Moreira José S Andrade Shlomo Havlin

We develop a method to generate robust networks against malicious attacks, as well as to substantially improve the robustness of a given network by swapping edges and keeping the degree distribution fixed. The method, based on persistence of the size of the largest cluster during attacks, was applied to several types of networks with broad degree distributions, including a real network—the Inte...

Journal: :J. Network and Computer Applications 2015
Engin Arslan Murat Yuksel Mehmet Hadi Gunes

Management and automated configuration of large-scale networks is one of the crucial issues for Internet Service Providers (ISPs). Since incorrect configurations may lead to loss of an enormous amount of customer traffic, highly experienced network administrators are typically the ones who are trusted for the management and configuration of a running ISP network. In this paper, we present an on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید