Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
— The ability to identify protein binding sites and to detect specific amino acid residues that contribute to the specificity and affinity of protein interactions has importan...
Abstract. Validation can be used to detect when over tting starts during supervised training of a neural network; training is then stopped before convergence to avoid the over ttin...
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...