Author of the publication

Generalized Independent Component Analysis as Density Estimation.

, and . WIRN, volume 2486 of Lecture Notes in Computer Science, page 83-89. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-term Path Prediction in Urban Scenarios using Circular Distributions, , , , , and . Image and Vision Computing, (January 2018)Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms., , and . Concurr. Comput. Pract. Exp., (2018)Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace.. Int. J. Netw. Secur., 6 (1): 6-14 (2008)Guest Editorial: Soft Computing Applications for Novel and Upcoming Distributed and Parallel Systems From Cloud Computing and Beyond., , , and . IEEE Trans. Ind. Informatics, 15 (10): 5646-5647 (2019)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners., , , and . Comput., 13 (2): 43 (2024)CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices., , , , , and . ACM Trans. Cyber Phys. Syst., 4 (3): 34:1-34:19 (2020)Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems., and . Future Gener. Comput. Syst., (2020)Improving the gossiping effectiveness with distributed strategic learning (Invited paper)., , , and . Future Gener. Comput. Syst., (2017)Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources., , , , and . Math. Comput. Model., 58 (5-6): 1389-1404 (2013)Stackelberg games for modeling defense scenarios against cloud security threats., , and . J. Netw. Comput. Appl., (2018)