Author of the publication

Heuristics to reduce linear combinations of activation functions to improve image classification.

, , , , , and . SIBGRAPI, page 169-174. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bio-inspired approaches to anomaly and intrusion detection., and . GECCO (Companion), page 1121-1137. ACM, (2018)Towards Optimally Weighted Physics-Informed Neural Networks in Ocean Modelling., , , and . CoRR, (2021)Model-building algorithms for multiobjective EDAs: Directions for improvement., , , and . IEEE Congress on Evolutionary Computation, page 2843-2850. IEEE, (2008)How Machine Learning Could Detect Anomalies on Thinger.io Platform?, , , and . PAAMS (Workshops), volume 887 of Communications in Computer and Information Science, page 259-269. Springer, (2018)High-Level Information Fusion for Risk and Accidents Prevention in Pervasive Oil Industry Environments., , , and . PAAMS (Workshops), volume 430 of Communications in Computer and Information Science, page 202-213. Springer, (2014)Applying VorEAl for IoT Intrusion Detection., , and . HAIS, volume 10870 of Lecture Notes in Computer Science, page 363-374. Springer, (2018)Introducing MONEDA: scalable multiobjective optimization with a neural estimation of distribution algorithm., , , and . GECCO, page 689-696. ACM, (2008)Multiobjective evolutionary polygonal approximation for identifying crude oil reservoirs., , , , and . GECCO (Companion), page 1805-1812. ACM, (2018)A stopping criterion based on Kalman estimation techniques with several progress indicators., , , , and . GECCO, page 587-594. ACM, (2009)Gamification and Information Fusion for Rehabilitation: An Ambient Assisted Living Case Study., , , , and . HCI (25), volume 9755 of Lecture Notes in Computer Science, page 16-25. Springer, (2016)