Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks., , and . ICISSP, page 97-104. SciTePress, (2016)A bio-inspired pursuit strategy for optimal control with partially constrained final state., and . Autom., 43 (7): 1265-1273 (2007)Whole-genome sequence of a flatfish provides insights into ZW sex chromosome evolution and adaptation to a benthic lifestyle, , , , , , , , , and 35 other author(s). Nat Genet, 46 (3): 253-60 (2014)A Threshold Function for Harmonic Update., and . SIAM J. Discret. Math., 10 (3): 482-498 (1997)Learning finite binary sequences from half-space data., and . Random Struct. Algorithms, 14 (4): 345-381 (1999)On the Average Tractability of Binary Integer Programming and the Curious Transition to Perfect Generalization in Learning Majority Functions., and . COLT, page 310-316. ACM, (1993)Learning Binary Perceptrons Perfectly Efficiently., and . J. Comput. Syst. Sci., 52 (2): 374-389 (1996)The capacity of majority rule., and . Random Struct. Algorithms, 12 (1): 83-109 (1998)Learning Finite Binary Sequences from Half-Space Data., and . ICNN, page 2955-2959. IEEE, (1995)Ultrasonic spectral-parameter imaging of the prostate., , , , , , and . Int. J. Imaging Systems and Technology, 8 (1): 11-25 (1997)