Author of the publication

Using Echo State Networks for Cryptography.

, , , and . ICANN (2), volume 10614 of Lecture Notes in Computer Science, page 663-671. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Die Umweltverankerung von Begriffsbildungsprozessen.. Künstliche Intell., 5 (1): 22-26 (1991)Learning Syllogism with Euler Neural-Networks., , , , , and . CoRR, (2020)Visual analytics tools for analysis of movement data., , and . SIGKDD Explor., 9 (2): 38-46 (2007)Inductive Logic Programming for Knowledge Discovery in Databases. page 74--101. Springer Berlin Heidelberg, Berlin, Heidelberg, (2001)A conceptual framework and taxonomy of techniques for analyzing movement., , , , , and . J. Vis. Lang. Comput., 22 (3): 213-232 (2011)A comparative study on methods for reducing myopia of hill-climbing search in multirelational learning., and . ICML, volume 69 of ACM International Conference Proceeding Series, ACM, (2004)Ising Models for Binary Clustering via Adiabatic Quantum Computing., , , , , and . EMMCVPR, volume 10746 of Lecture Notes in Computer Science, page 3-17. Springer, (2017)Active Hidden Markov Models for Information Extraction., , and . IDA, volume 2189 of Lecture Notes in Computer Science, page 309-318. Springer, (2001)Demand-Driven Concept Formation.. Knowledge Representation and Organization in Machine Learning, volume 347 of Lecture Notes in Computer Science, page 289-319. Springer, (1987)Towards a Model of Grounded Concept Formation.. IJCAI, page 712-719. Morgan Kaufmann, (1991)