Share Email Print
cover

Proceedings of SPIE Volume 9119

Machine Intelligence and Bio-inspired Computation: Theory and Applications VIII
Editor(s): Misty Blowers; Jonathan Williams
Format Member Price Non-Member Price
Softcover $52.50 $70.00

Volume Details

Volume Number: 9119
Date Published: 9 June 2014
Softcover: 21 papers (212) pages
ISBN: 9781628410563

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 9119
Author(s): Proceedings of SPIE
A tale of three bio-inspired computational approaches
Author(s): J. David Schaffer;
Show Abstract
Probabilistic graphs using coupled random variables
Author(s): Kenric P. Nelson; Madalina Barbu; Brian J. Scannell
Show Abstract
Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments
Author(s): Kevin Nelson; George Corbin; Misty Blowers
Show Abstract
AHaH computing with thermodynamic RAM: bridging the technology stack
Author(s): Alex Nugent
Show Abstract
Energy-efficient STDP-based learning circuits with memristor synapses
Author(s): Xinyu Wu; Vishal Saxena; Kristy A. Campbell
Show Abstract
Towards leakage resiliency: memristor-based AES design for differential power attack mitigation
Author(s): Ganesh Khedkar; Colin Donahue; Dhireesha Kudithipudi
Show Abstract
Heterogeneous CMOS/memristor hardware neural networks for real-time target classification
Author(s): Cory Merkel; Dhireesha Kudithipudi; Ray Ptucha
Show Abstract
Hardware-based artificial neural networks for size, weight, and power constrained platforms
Author(s): B. T. Wysocki; N. R. McDonald; C. D. Thiem
Show Abstract
A reinforcement learning trained fuzzy neural network controller for maintaining wireless communication connections in multi-robot systems
Author(s): Xu Zhong; Yu Zhou
Show Abstract
A novel pipeline based FPGA implementation of a genetic algorithm
Author(s): Nonel Thirer
Show Abstract
Applying hardware-based machine learning to signature-based network intrusion detection
Author(s): Garrett Payer; Chris McCormick; Richard Harang; Bruce McCormick
Show Abstract
The application of top-down abstraction learning using prediction as a supervisory signal to cyber security
Author(s): Jonathan Mugan; Aram E. Khalili
Show Abstract
Index of cyber integrity
Author(s): Gustave Anderson
Show Abstract
Neuromorphic computing applications for network intrusion detection systems
Author(s): Raymond C. Garcia; Robinson E. Pino
Show Abstract
Bio-inspired diversity for increasing attacker workload
Author(s): Stephen Kuhn
Show Abstract
Patterns of life in temporal data: indexing and hashing for fast and relevant data retrieval
Author(s): Matthew Jacobsen; Georgiy Levchuk; Mark Weston; Jennifer Roberts
Show Abstract
Analysis of large-scale distributed knowledge sources via autonomous cooperative graph mining
Author(s): Georgiy Levchuk; Andres Ortiz; Xifeng Yan
Show Abstract
Trust metrics in information fusion
Author(s): Erik Blasch
Show Abstract
Quick data evaluation inspired by human vision
Author(s): Dieter Meinert
Show Abstract
Intelligent water drops for aerospace and defense applications
Author(s): Jeremy Straub
Show Abstract
Autonomous target tracking of UAVs based on low-power neural network hardware
Author(s): Wei Yang; Zhanpeng Jin; Clare Thiem; Bryant Wysocki; Dan Shen; Genshe Chen
Show Abstract

© SPIE. Terms of Use
Back to Top