Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
In this paper, we address the modality integration issue on the example of a smart room environment aiming at enabling person identification by combining acoustic features and 2D f...
Jordi Luque, Ramon Morros, Ainara Garde, Jan Angui...
We treat feature selection and basis selection in a unified framework by introducing the masking matrix. If one considers feature selection as finding a binary mask vector that de...
Experimental results characterizing a VLSI multi-channel potentiostat sensor system designed for sensing distributed neurotransmitter activity are presented. Neurotransmitter conc...
G. Mulliken, Mihir Naware, A. Bandyopadhyay, Gert ...
A review is given of approaches to growing neural networks and electronic circuits. A new method for growing graphs and circuits using a developmental process is discussed. The met...