Sciweavers

KES
1998
Springer
14 years 26 days ago
An acquisition of the relation between vision and action using self-organizing map and reinforcement learning
An agent must acquire internal representation appropriate for its task, environment, sensors. As a learning algorithm, reinforcement learning is often utilized to acquire the rela...
Kazunori Terada, Hideaki Takeda, Toyoaki Nishida
KES
1998
Springer
14 years 26 days ago
Attractor systems and analog computation
Attractor systems are useful in neurodynamics,mainly in the modelingof associative memory. Thispaper presentsa complexity theory for continuous phase space dynamical systems with ...
Hava T. Siegelmann, Shmuel Fishman
KES
1998
Springer
14 years 26 days ago
Hidden partitioning of a visual feedback-based neuro-controller
Robotic controllers take advantage from neural network learning capabilities as long as the dimensionality of the problem is kept moderate. This paper explores the possibilities of...
Jean-Philippe Urban, Jean-Luc Buessler, Julien Gre...
KES
1998
Springer
14 years 26 days ago
Neighborhood structures for genetic local search algorithms
Tadahiko Murata, Hisao Ishibuchi, Mitsuo Gen
KES
1998
Springer
14 years 26 days ago
Neuro-fuzzy techniques for airborne target tracking
Ivan Patt Wing Ching, Yongzhi Liu, Leonard Chin, D...
IH
1998
Springer
14 years 26 days ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...
IH
1998
Springer
14 years 26 days ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
IH
1998
Springer
14 years 26 days ago
On Software Protection via Function Hiding
Software piracy is a major economic problem: it leads to revenue losses, it favors big software houses that are less hurt by these losses and it prevents new software economy model...
Tomas Sander, Christian F. Tschudin
IH
1998
Springer
14 years 26 days ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...