1,061 research outputs found

    1st INCF Workshop on Needs for Training in Neuroinformatics

    Get PDF
    The INCF workshop on Needs for Training in Neuroinformatics was organized by the INCF National Node of the UK. The scope of the workshop was to provide as overview of the current state of neuroinformatics training and recommendations for future provision of training. The report presents a summary of the workshop discussions and recommendations to the INCF

    INCF Workshops on Needs for Training in Neuroinformatics: Extended and Short Course Provision

    Get PDF
    The second and third _INCF Workshops on Training in Neuroinformatics_ were organized by the INCF National Node of the UK. In these workshops, the issues arising in providing extended courses, such as a full time Masters, or short courses, of a few days or a few weeks, were discussed. There was a focus on how the INCF could facilitate training in these types of courses. In this report, the recommendations from all three Training workshops are brought together

    Naturally Rehearsing Passwords

    Full text link
    We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and validated through empirical studies. Given rehearsal requirements and a user's visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues--- a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals

    Synergetic Analysis of the Haeussler-von der Malsburg Equations for Manifolds of Arbitrary Geometry

    Full text link
    We generalize a model of Haeussler and von der Malsburg which describes the self-organized generation of retinotopic projections between two one-dimensional discrete cell arrays on the basis of cooperative and competitive interactions of the individual synaptic contacts. Our generalized model is independent of the special geometry of the cell arrays and describes the temporal evolution of the connection weights between cells on different manifolds. By linearizing the equations of evolution around the stationary uniform state we determine the critical global growth rate for synapses onto the tectum where an instability arises. Within a nonlinear analysis we use then the methods of synergetics to adiabatically eliminate the stable modes near the instability. The resulting order parameter equations describe the emergence of retinotopic projections from initially undifferentiated mappings independent of dimension and geometry.Comment: Dedicated to Hermann Haken on the occasion of his 80th birthda

    Analysis of Oscillator Neural Networks for Sparsely Coded Phase Patterns

    Full text link
    We study a simple extended model of oscillator neural networks capable of storing sparsely coded phase patterns, in which information is encoded both in the mean firing rate and in the timing of spikes. Applying the methods of statistical neurodynamics to our model, we theoretically investigate the model's associative memory capability by evaluating its maximum storage capacities and deriving its basins of attraction. It is shown that, as in the Hopfield model, the storage capacity diverges as the activity level decreases. We consider various practically and theoretically important cases. For example, it is revealed that a dynamically adjusted threshold mechanism enhances the retrieval ability of the associative memory. It is also found that, under suitable conditions, the network can recall patterns even in the case that patterns with different activity levels are stored at the same time. In addition, we examine the robustness with respect to damage of the synaptic connections. The validity of these theoretical results is confirmed by reasonable agreement with numerical simulations.Comment: 23 pages, 11 figure

    Quantitative assessment of computational models for retinotopic map formation.

    Get PDF
    Molecular and activity-based cues acting together are thought to guide retinal axons to their terminal sites in vertebrate optic tectum or superior colliculus (SC) to form an ordered map of connections. The details of mechanisms involved, and the degree to which they might interact, are still not well understood. We have developed a framework within which existing computational models can be assessed in an unbiased and quantitative manner against a set of experimental data curated from the mouse retinocollicular system. Our framework facilitates comparison between models, testing new models against known phenotypes and simulating new phenotypes in existing models. We have used this framework to assess four representative models that combine Eph/ephrin gradients and/or activity-based mechanisms and competition. Two of the models were updated from their original form to fit into our framework. The models were tested against five different phenotypes: wild type, Isl2-EphA3(ki/ki), Isl2-EphA3(ki/+), ephrin-A2,A3,A5 triple knock-out (TKO), and Math5(-/-) (Atoh7). Two models successfully reproduced the extent of the Math5(-/-) anteromedial projection, but only one of those could account for the collapse point in Isl2-EphA3(ki/+). The models needed a weak anteroposterior gradient in the SC to reproduce the residual order in the ephrin-A2,A3,A5 TKO phenotype, suggesting either an incomplete knock-out or the presence of another guidance molecule. Our article demonstrates the importance of testing retinotopic models against as full a range of phenotypes as possible, and we have made available MATLAB software, we wrote to facilitate this process.Contract grant sponsors: Wellcome Trust; contract grant numbers: 083205, Engineering and Physical Sciences Research Council (EPSRC) (CSC).This is the published version. It's also available from Wiley at http://onlinelibrary.wiley.com/doi/10.1002/dneu.22241/abstract

    Elastic net model of ocular dominance - overall stripe pattern and monocular deprivation

    Get PDF
    The elastic net (Durbin and Willshaw 1987) can account for the development of both topography and ocular dominance in the mapping from the lateral geniculate nucleus to primary visual cortex (Goodhill and Willshaw 1990). Here it is further shown for this model that (1) the overall pattern of stripes produced is strongly influenced by the shape of the cortex: in particular, stripes with a global order similar to that seen biologically can be produced under appropriate conditions, and (2) the observed changes in stripe width associated with monocular deprivation are reproduced in the model
    corecore