Bounds on capacity of multi-threshold network

被引:0
|
作者
Bentov, I. [1 ]
Huang, N.K. [1 ]
机构
[1] Univ of Minnesota, United States
来源
| 1600年 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Systems Science and Cybernetics
引用
收藏
相关论文
共 50 条
  • [21] Limit sets of generalized, multi-threshold networks
    Network Dynamics and Simulation Science Laboratory, Virginia Tech, United States
    不详
    J. Cell. Aut., 3-4 (161-193):
  • [22] Multi-Threshold Voltage FinFET Sequential Circuits
    Tawfik, Sherif A.
    Kursun, Volkan
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2011, 19 (01) : 151 - 156
  • [23] Opto-electronics hybrid implementation of a multi-state and multi-threshold neural network model
    Huang, Daquan
    Huang, Haiyun
    Guangxue Xuebao/Acta Optica Sinica, 1996, 16 (06): : 772 - 776
  • [24] Multi-threshold Generation Method of Fuzzy Implications
    Drygas, Pawel
    Krol, Anna
    Qin, Feng
    2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [25] The PH/PH/1 Multi-threshold Queue
    Baer, Niek
    Boucherie, Richard J.
    van Ommeren, Jan-Kees
    ANALYTICAL AND STOCHASTIC MODELLING TECHNIQUES AND APPLICATIONS, 2014, 8499 : 95 - 109
  • [26] A multi-threshold based audio steganography scheme
    Kar, Dulal C.
    Mulkey, Clifton J.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 54 - 67
  • [27] Multi-threshold Fuzzy Clustering Sorting Algorithm
    Wang, Jiawei
    Hou, Changbo
    Qu, Fuxin
    2017 PROGRESS IN ELECTROMAGNETICS RESEARCH SYMPOSIUM - SPRING (PIERS), 2017, : 889 - 892
  • [28] On Leveraging Multi-threshold FinFETs for Design Obfuscation
    Patil, Vinay C.
    Kundu, Sandip
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 108 - 113
  • [29] MULTI-THRESHOLD ACCELERATED FAILURE TIME MODEL
    Li, Jialiang
    Jin, Baisuo
    ANNALS OF STATISTICS, 2018, 46 (06): : 2657 - 2682
  • [30] Consideration for multi-threshold multi-secret sharing schemes
    Waseda, Atsushi
    Soshi, Masakazu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 265 - 269