Author of the publication

Neural Coding Analysis in Retinal Ganglion Cells Using Information Theory.

, , , , and . ICANN, volume 2415 of Lecture Notes in Computer Science, page 174-179. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise security pattern: A model-driven architecture instance., , , and . Comput. Stand. Interfaces, 36 (4): 748-758 (2014)BlockBD: a security pattern to incorporate blockchain in big data ecosystems., , , and . EuroPLoP, page 17:1-17:8. ACM, (2019)Application of security reference architecture to Big Data ecosystems in an industrial scenario., , , , and . Softw. Pract. Exp., 50 (8): 1520-1538 (2020)Enterprise security pattern: a new type of security pattern., , , , and . Secur. Commun. Networks, 7 (11): 1670-1690 (2014)Secure Development of Big Data Ecosystems., , , and . IEEE Access, (2019)Towards a Security Reference Architecture for Big Data., , , and . DOLAP, volume 2062 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Security Pattern for Key-Value NoSQL Database Authorization., , , and . EuroPLoP, page 12:1-12:4. ACM, (2018)Inverse lighting design for interior buildings integrating natural and artificial sources., and . Comput. Graph., 36 (8): 1096-1108 (2012)On the convergence of LMS filters under periodic signals., , and . Digit. Signal Process., 23 (3): 808-816 (2013)Evolutionary multiobjective optimization using an outranking-based dominance generalization., , , , and . Comput. Oper. Res., 37 (2): 390-395 (2010)