In this paper, a recursive nonlinear filter exploiting trigonometric expansions of the past output samples is introduced. Its peculiarity is, in general, the ability to model rea...
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
A preliminary study was conducted to help understand the purpose of digital libraries (DLs) and to investigate whether meaningful results could be obtained from small user studies...
Yin Leng Theng, Norliza Mohd-Nasir, Harold W. Thim...
We investigate the interactions of subtyping and recursive types, in a simply typed λ-calculus. The two fundamental questions here are whether two (recursive) types are in the su...
Abstract. This paper presents a comparison between direct and recursive prediction strategies. In order to perform the input selection, an approach based on mutual information is u...
Yongnan Ji, Jin Hao, Nima Reyhani, Amaury Lendasse