A number of computational models of visual attention exist, but making comparisons is difficult due to the incompatible implementations and levels at which the simulations are con...
Albert L. Rothenstein, Andrei Zaharescu, John K. T...
Abstract. We develop a probabilistic interpretation of non-linear component extraction in neural networks that activate their hidden units according to a softmaxlike mechanism. On ...
This paper proposes the general paradigm to build Q'tron neural networks (NNs) for visual cryptography. Given a visual encryption scheme, usually described using an access st...
The variety of priority queueing systems with random switchover times is suggested in this paper. Such systems represent generalized models for a wide class of phenomena which inv...
Gh. Mishkoy, S. Giordano, A. Iu. Bejan, O. Benders...
Diffusion processes taking place in social networks are used to model a number of phenomena, such as the spread of human or computer viruses, and the adoption of products in `vira...