From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Intrusions using System Calls: Alternative Data Models., , и . S&P, стр. 133-145. IEEE Computer Society, (1999)Subject-Independent Magnetoencephalographic Source Localization by a Multilayer Perceptron., и . NIPS, стр. 741-748. MIT Press, (2003)Automatic Learning Rate Maximization in Large Adaptive Machines., , и . NIPS, стр. 156-163. Morgan Kaufmann, (1992)Lazy multivariate higher-order forward-mode AD., и . POPL, стр. 155-160. ACM, (2007)Optimal Coding Predicts Attentional Modulation of Activity in Neural Systems., и . Neural Comput., 19 (5): 1295-1312 (2007)Automatic differentiation in machine learning: a survey, , , и . (2015)cite arxiv:1502.05767Comment: 43 pages, 5 figures.Seeing is Worse than Believing: Reading People's Minds Better than Computer-Vision Methods Recognize Actions., , , , , , , , , и 5 other автор(ы). ECCV (5), том 8693 из Lecture Notes in Computer Science, стр. 612-627. Springer, (2014)Time-Skew Hebb rule in a nonisopotential neuron.. Neural Comput., 7 (4): 706-712 (1995)Soft-LOST: EM on a Mixture of Oriented Lines., и . ICA, том 3195 из Lecture Notes in Computer Science, стр. 430-436. Springer, (2004)Gradient Descent: Second Order Momentum and Saturating Error.. NIPS, стр. 887-894. Morgan Kaufmann, (1991)