Author of the publication

Approximation by superpositions of a sigmoidal function.

. Math. Control. Signals Syst., 2 (4): 303-314 (1989)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Hidden Markov Models using Non-Negative Matrix Factorization, and . CoRR, (2008)Asymptotic Behavior of Attack Graph Games., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 104-112. Springer, (2018)Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms.. ICASSP, page 498-501. IEEE, (1979)Semantic depth and markup complexity., , and . SMC, page 2138-2143. IEEE, (2003)Fixed Hypercube Embedding., , and . Inf. Process. Lett., 25 (1): 35-39 (1987)A fuzzy MHT algorithm applied to text-based information tracking., , and . IEEE Trans. Fuzzy Syst., 10 (3): 360-374 (2002)Approximation by superpositions of a sigmoidal function.. Math. Control. Signals Syst., 2 (4): 303-314 (1989)Network awareness and mobile agent systems., , , and . IEEE Commun. Mag., 36 (7): 44-49 (1998)Overview of Control and Game Theory in Adaptive Cyber Defenses., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)A Language of Life: Characterizing People Using Cell Phone Tracks., and . CSE (4), page 495-501. IEEE Computer Society, (2009)