The crucial role of mathematics in circuits, systems and signal processing research and education | 0 | 0.34 | 2016 |
Developing engineering-oriented educational workshops within a student branch. | 0 | 0.34 | 2013 |
Reducing the Number of Support Vectors of SVM Classifiers Using the Smoothed Separable Case Approximation | 51 | 2.11 | 2012 |
Machine learning in side-channel analysis: a first study. | 51 | 2.19 | 2011 |
Hardware Implementation Of An Elliptic Curve Processor Over Gf(P) With Montgomery Modular Multiplier | 1 | 0.36 | 2008 |
Super-Resolution From Unregistered and Totally Aliased Signals Using Subspace Methods | 21 | 1.38 | 2007 |
Partial Synchronization In Oscillator Arrays With Asymmetric Coupling | 1 | 0.48 | 2007 |
Learning Of Spatiotemporal Behaviour In Cellular Neural Networks | 8 | 0.70 | 2006 |
Spectral characterization of cryptographic boolean functions satisfying the (extended) propagation criterion of degree l and order k | 1 | 0.35 | 2005 |
Special Section on Nonlinear Theory and its Applications | 0 | 0.34 | 2005 |
A Double Scroll Based True Random Bit Generator | 4 | 0.84 | 2004 |
A Comparison of Pruning Algorithms for Sparse Least Squares Support Vector Machines | 33 | 1.41 | 2004 |
Benchmarking Least Squares Support Vector Machine Classifiers | 243 | 12.31 | 2004 |
Computation of the Canonical Decomposition by Means of a Simultaneous Generalized Schur Decomposition | 67 | 6.25 | 2004 |
Kernel PLS variants for regression | 4 | 0.57 | 2003 |
Revocable Anonymous Access To The Internet? | 12 | 0.93 | 2003 |
Cryptanalysis of 3-Pass HAVAL | 21 | 2.61 | 2003 |
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions | 51 | 4.11 | 2003 |
Cryptanalysis of SOBER-t32 | 2 | 0.44 | 2003 |
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array | 29 | 1.94 | 2003 |
Hardware implementation of an elliptic curve processor over GF(p) | 45 | 2.38 | 2003 |
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher. | 2 | 0.38 | 2002 |
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem | 20 | 1.22 | 2002 |
Applying General Access Structure to Proactive Secret Sharing Schemes. | 10 | 0.89 | 2002 |
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure | 2 | 0.41 | 2002 |
Weighted least squares support vector machines: robustness and sparse approximation | 331 | 20.80 | 2002 |
On Unconditionally Secure Distributed Oblivious Transfer | 11 | 0.67 | 2002 |
On a resynchronization weakness in a class of combiners with memory | 2 | 0.42 | 2002 |
Families Of Scroll Grid Attractors | 81 | 22.89 | 2002 |
Bayesian Framework for Least-Squares Support Vector Machine Classifiers, Gaussian Processes, and Kernel Fisher Discriminant Analysis | 112 | 9.29 | 2002 |
Secure Meeting Scheduling with agenTA | 3 | 0.49 | 2001 |
New (Two-Track-)MAC Based on the Two Trails of RIPEMD | 3 | 0.48 | 2001 |
Automatic relevance determination for Least Squares Support Vector Machines classifiers | 10 | 1.48 | 2001 |
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT | 9 | 0.96 | 2001 |
Improved long-term temperature prediction by chaining of neural networks. | 11 | 0.85 | 2001 |
Artificial Neural Networks in Hydrological Watershed Modeling: Surface Flow Contribution from the Ungauged Parts of a Catchment | 1 | 0.37 | 2001 |
Combining World Wide Web and Wireless Security | 11 | 1.47 | 2001 |
Optimal control by least squares support vector machines | 111 | 10.74 | 2001 |
In Memoriam – Vitold Belevitch | 0 | 0.34 | 2000 |
Sparse approximation using least squares support vector machines | 86 | 5.82 | 2000 |
Chaos Synchronization: A Lagrange Programming Network Approach | 0 | 0.34 | 2000 |
On the Best Rank-1 and Rank-(R1,R2,. . .,RN) Approximation of Higher-Order Tensors | 216 | 15.64 | 2000 |
A Multilinear Singular Value Decomposition | 1164 | 66.60 | 2000 |
An algebraic approach to the blind identification of paraunitary filters | 1 | 0.37 | 2000 |
The K.U.Leuven competition data: a challenge for advanced neural network techniques | 3 | 0.44 | 2000 |
CNN Algorithms for Video Authentication and Copyright Protection | 0 | 0.34 | 1999 |
A hybrid system for fraud detection in mobile communications | 5 | 0.59 | 1999 |
Multiclass least squares support vector machines | 53 | 8.94 | 1999 |
Improved generalization ability of neurocontrollers by imposing NLq stability constraints | 0 | 0.34 | 1998 |
Setting up a Secure Web Server and Clients on an Intranet | 1 | 0.39 | 1998 |