We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
In the present paper, Wavelet Networks, are proven to be, as well as many other neural paradigms, a speci c case of the generic paradigm named Weighted Radial Basis Functions Netw...
Mirko Sgarbi, Valentina Colla, Leonardo Maria Reyn...
Abstract. In this paper we present a functional model of a spiking neuron intended for hardware implementation. Some features of biological spiking neuabstracted, while preserving ...
In this work we evaluate a Particle Swarm Optimizer hybridized with Differential Evolution and apply it to the BlackBox Optimization Benchmarking for noisy functions (BBOB 2009)....
In this work we evaluate a Particle Swarm Optimizer hybridized with Differential Evolution and apply it to the BlackBox Optimization Benchmarking for noiseless functions (BBOB 20...