Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Cryptanalysis of Hash Functions Based on Block Ciphers., , and . ACM Conference on Computer and Communications Security, page 183-188. ACM, (1993)Training multilayer perceptron classifiers based on a modified support vector method., and . IEEE Trans. Neural Networks, 10 (4): 907-911 (1999)A note on 'Efficient numerically stabilized rank-one eigenstructure updating' and reply., , , and . IEEE Trans. Signal Process., 39 (8): 1911-1914 (1991)A new inequality in discrete Fourier theory., , and . IEEE Trans. Inf. Theory, 49 (8): 2038-2040 (2003)Bandpass prefiltering for exponential data fitting with known frequency region of interest., , and . Signal Process., 48 (2): 135-154 (1996)A concepts inventory for an attractive teaching approach of the mathematics of circuits and systems.. ISCAS, page 2800-2803. IEEE, (2010)Important questions related to the education of the mathematics of circuits and systems.. ISCAS, page 77-80. IEEE, (2010)In Memoriam - Vitold Belevitch.. I. J. Circuit Theory and Applications, 28 (5): 429-430 (2000)Guest editorial: Special issue on communications, information processing and control using chaos., and . I. J. Circuit Theory and Applications, 27 (6): 525-526 (1999)Guest Editorial: Special Issue: Cellular Neural Networks., and . I. J. Circuit Theory and Applications, 24 (1): 3-5 (1996)