Abstract
No abstract available.
Cited By
- Beniamini G The approximate degree of bipartite perfect matching Proceedings of the 37th Computational Complexity Conference, (1-26)
- Kong Y and Saeedi E (2019). The investigation of neural networks performance in side-channel attacks, Artificial Intelligence Review, 52:1, (607-623), Online publication date: 1-Jun-2019.
- Hashemi M and Hall M Identifying the Responsible Group for Extreme Acts of Violence Through Pattern Recognition HCI in Business, Government, and Organizations, (594-605)
- Teran E, Wang Z and Jiménez D Perceptron learning for reuse prediction The 49th Annual IEEE/ACM International Symposium on Microarchitecture, (1-12)
- Harrington K (2016). A circuit basis for morphogenesis, Theoretical Computer Science, 633:C, (28-36), Online publication date: 20-Jun-2016.
- Pagh R Locality-sensitive hashing without false negatives Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1-9)
- Yuksel K and Adali S Prototyping input controller for touch-less interaction with ubiquitous environments Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, (635-640)
- Chen Z and Fu B Approximating multilinear monomial coefficients and maximum multilinear monomials in multivariate polynomials Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I, (309-323)
- Sug H (2009). Empirical determination of sample sizes for multi-layer perceptrons by simple RBF networks, WSEAS Transactions on Computers, 8:9, (1504-1513), Online publication date: 1-Sep-2009.
- Sug H A pilot sampling method for multi-layer perceptrons Proceedings of the WSEAES 13th international conference on Computers, (629-633)
- Latino C, Moreno-Armendáriz M and Hagan M Realizing general MLP networks with minimal FPGA resources Proceedings of the 2009 international joint conference on Neural Networks, (702-709)
- Levy S and Gayler R Vector Symbolic Architectures Proceedings of the 2008 conference on Artificial General Intelligence 2008: Proceedings of the First AGI Conference, (414-418)
- Sherstov A The pattern matrix method for lower bounds on quantum communication Proceedings of the fortieth annual ACM symposium on Theory of computing, (85-94)
- Klivans A and Sherstov A (2007). Unconditional lower bounds for learning intersections of halfspaces, Machine Language, 69:2-3, (97-114), Online publication date: 1-Dec-2007.
- Sherstov A Separating AC0 from depth-2 majority circuits Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (294-301)
- Gori M and Sperduti A (2005). 2005 Special Issue, Neural Networks, 18:8, (1064-1079), Online publication date: 1-Oct-2005.
- Case J Automata theory Encyclopedia of Computer Science, (112-117)
- Albrecht A and Wong C (2001). Combining the Perceptron Algorithm with Logarithmic Simulated Annealing, Neural Processing Letters, 14:1, (75-83), Online publication date: 1-Aug-2001.
- Beals R, Buhrman H, Cleve R, Mosca M and de Wolf R (2001). Quantum lower bounds by polynomials, Journal of the ACM, 48:4, (778-797), Online publication date: 1-Jul-2001.
- Gat Y (2001). A Learning Generalization Bound with an Application to Sparse-Representation Classifiers, Machine Language, 42:3, (233-239), Online publication date: 1-Mar-2001.
- Kumar R (2001). A neural net compiler system for hierarchical organization, ACM SIGPLAN Notices, 36:2, (26-36), Online publication date: 1-Feb-2001.
- Balkenius C (1999). Dynamics of a Classical Conditioning Model, Autonomous Robots, 7:1, (41-56), Online publication date: 1-Jul-1999.
- Nayak A and Wu F The quantum query complexity of approximating the median and related statistics Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (384-393)
- Linial N and Sasson O Non-expansive hashing Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, (509-518)
- Glover C, Rao N and Oblow E Hybrid pattern recognition system capable of self-modification Proceedings of the second international conference on Information and knowledge management, (239-244)
- Kearns M Efficient noise-tolerant learning from statistical queries Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing, (392-401)
- Regier T Learning perceptually-grounded semantics in the L0 project Proceedings of the 29th annual meeting on Association for Computational Linguistics, (138-145)
- Montanvert A, Meer P and Rosenfeld A (1991). Hierarchical Image Analysis Using Irregular Tessellations, IEEE Transactions on Pattern Analysis and Machine Intelligence, 13:4, (307-316), Online publication date: 1-Apr-1991.
- Yao A Circuits and local computation Proceedings of the twenty-first annual ACM symposium on Theory of computing, (186-196)
- Brown D Kraft storage and access for list implementations(Extended Abstract) Proceedings of the twelfth annual ACM symposium on Theory of computing, (100-107)
Index Terms
- Perceptrons: expanded edition
Recommendations
Evolving Multilayer Perceptrons
This paper proposes a new version of a method (G-Prop, genetic backpropagation) that attempts to solve the problem of finding appropriate initial weights and learning parameters for a single hidden layer Multilayer Perceptron (MLP) by combining an ...
Progressive Operational Perceptrons
There are well-known limitations and drawbacks on the performance and robustness of the feed-forward, fully-connected Artificial Neural Networks (ANNs), or the so-called Multi-Layer Perceptrons (MLPs). In this study we shall address them by Generalized ...