Author:
Heiser Jay,Stanek Steve,Hamidi Sasan,Rothke Ben,Lambert Paul,Spencer Poore Ralph,Tiller James,Gove Ronald,Edmead Mark,Ikbel Javek,Pasley Keith,Hugh Murray William,DeMaio Harry,Merrill Douglas,Feigenbaum Eran,Grabow Geoffrey,Golod Alex,Kovara Joe,Kaplan Ray,Houwen Joost
Reference156 articles.
1. Ahmad, S. 1988. A Study of Scaling and Generalization in Neural Networks, Tech. Rep. CCSR-88-13, Urbana: University of Illinois, Center for Complex Systems Research.
2. Atlas, L., R. Cole, J. Connor, and M. El-Sharkawi. 1989. Performance comparisons between backpropagation networks and classification trees on three real-world applications.Adv. Neural Inform. Proc. Syst. 2:622-629.
3. Aura, T. 1995. Invisible communication. InProc. of EET 1995, Tech. Rep., Helsinki, Finland: Helsinki University of Technology (http://deadlock.hut.fi/ste/ste_html.html).
4. Berg, G., I. Davidson, M. Duan, and G. Paul. 2003. Searching for hidden messages: automatic detection of steganography. InProc. of the 15th AAAI Innovative Applications of Artificial Intelligence Conference, Acapulco, Mexico, August12-14,2003.
5. Cox, I. et al. 1996. A secure, robust watermark for multimedia. InProc. of the First International Workshop on Information Hiding, Lecture Notes in Computer Science No. 1, pp.185-206. Berlin: Springer-Verlag.