Author of the publication

How Embedded Memory in Recurrent Neural Network Architectures Helps Learning Long-Term Temporal Dependencies

, , and . Neural Networks, 11 (5): 861--868 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient algorithms for function approximation with piecewise linear sigmoidal networks., and . IEEE Trans. Neural Networks, 9 (6): 1129-1141 (1998)If Piracy Is the Problem, Is DRM the Answer?, , , , and . Digital Rights Management, volume 2770 of Lecture Notes in Computer Science, Springer, (2003)Learning long-term dependencies is not as difficult with NARX networks., , , and . NIPS, page 577-583. MIT Press, (1995)Online prediction of multiprocessor memory access patterns., , , , , and . ICNN, page 1564-1569. IEEE, (1996)On Computer Security Incident Response Teams.. IEEE Secur. Priv., 12 (5): 13-15 (2014)Attractive Periodic Sets in Discrete-Time Recurrent Networks (with Emphasis on Fixed-Point Stability and Bifurcations in Two-Neuron Networks)., , and . Neural Comput., 13 (6): 1379-1414 (2001)How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies., , and . Neural Networks, 11 (5): 861-868 (1998)An analysis of noise in recurrent neural networks: convergence and generalization., , and . IEEE Trans. Neural Networks, 7 (6): 1424-1438 (1996)A delay damage model selection algorithm for NARX neural networks., , , and . IEEE Trans. Signal Process., 45 (11): 2719-2730 (1997)Dynamic Self-Checking Techniques for Improved Tamper Resistance., , , and . Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, page 141-159. Springer, (2001)