Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Escrow services and incentives in peer-to-peer networks., , and . EC, page 85-94. ACM, (2001)What NARX Networks Can Compute., , and . SOFSEM, volume 1012 of Lecture Notes in Computer Science, page 95-102. Springer, (1995)A Delay Damage Model Selection Algorithm for NARX Neural Networks, , , and . IEEE Transactions on Signal Processing, 45 (11): 2719--2730 (1997)An experimental comparison of recurrent neural networks., and . NIPS, page 697-704. MIT Press, (1994)Representation and Induction of Finite State Machines using Time-Delay Neural Networks., , , and . NIPS, page 403-409. MIT Press, (1996)Function Approximation with the Sweeping Hinge Algorithm., , and . NIPS, page 535-541. The MIT Press, (1997)Dynamic Self-Checking Techniques for Improved Tamper Resistance., , , and . Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, page 141-159. Springer, (2001)A delay damage model selection algorithm for NARX neural networks., , , and . IEEE Trans. Signal Process., 45 (11): 2719-2730 (1997)Attractive Periodic Sets in Discrete-Time Recurrent Networks (with Emphasis on Fixed-Point Stability and Bifurcations in Two-Neuron Networks)., , and . Neural Comput., 13 (6): 1379-1414 (2001)An analysis of noise in recurrent neural networks: convergence and generalization., , and . IEEE Trans. Neural Networks, 7 (6): 1424-1438 (1996)