


default search action
Neurocomputing, Volume 289
Volume 289, May 2018
- Zhibin Zhu, Jiawen Yao
, Zheng Xu, Junzhou Huang
, Benxin Zhang:
A simple primal-dual algorithm for nuclear norm and total variation regularization. 1-12 - Marcin Zalasinski
, Krzysztof Cpalka
:
A new method for signature verification based on selection of the most important partitions of the dynamic signature. 13-22 - Lei Luo
, Qinghua Tu, Jian Yang, Jingyu Yang:
An adaptive line search scheme for approximated nuclear norm based matrix regression. 23-31 - Chengzhe Yan, Jie Hu, Changshui Zhang:
Deep transformer: A framework for 2D text image rectification from planar transformations. 32-43 - Chunjuan Bo, Junxing Zhang, Junjie Liu, Qiang Yao:
Robust online object tracking via the convex hull representation model. 44-54 - Maying Shen, Xinghao Jiang, Tanfeng Sun
:
Anomaly detection based on Nearest Neighbor search with Locality-Sensitive B-tree. 55-67 - Francisco Charte, Antonio J. Rivera
, David Charte, María José del Jesus, Francisco Herrera:
Tips, guidelines and tools for managing multi-label datasets: The mldr.datasets R package and the Cometa data repository. 68-85 - Guoqiang Wu
, Yingjie Tian
, Chunhua Zhang:
A unified framework implementing linear binary relevance for multi-label learning. 86-100 - Andreas Christmann
, Dao-Hong Xiang
, Ding-Xuan Zhou:
Total stability of kernel methods. 101-118 - Jorge Sueiras
, Victoria Ruíz, Ángel Sánchez, José Francisco Vélez:
Offline continuous handwriting recognition using sequence to sequence neural networks. 119-128 - Tegjyot Singh Sethi
, Mehmed M. Kantardzic
:
Data driven exploratory attacks on black box classifiers in adversarial domains. 129-143 - Yueheng Li, Biao Luo
, Derong Liu
, Zhanyu Yang:
Robust synchronization of memristive neural networks with strong mismatch characteristics via pinning control. 144-154 - Marko D. Petkovic
, Predrag S. Stanimirovic
, Vasilios N. Katsikis
:
Modified discrete iterations for computing the inverse and pseudoinverse of the time-varying matrix. 155-165 - Song Han
, Xinbin Li, Lei Yan, Zhixin Liu, Xinping Guan:
Game-based hierarchical multi-armed bandit learning algorithm for joint channel and power allocation in underwater acoustic communication networks. 166-179 - Zhen Chen
, Yuli Fu, Youjun Xiang, Junwei Xu, Rong Rong:
A novel low-rank model for MRI using the redundant wavelet tight frame. 180-187 - Shiyuan Wang
, Wanli Wang, Badong Chen
, Chi K. Tse
:
Convergence analysis of nonlinear Kalman filters with novel innovation-based method. 188-194 - Antonela Tommasel, Daniela Godoy:
Multi-view community detection with heterogeneous information from social media data. 195-219 - Zhengqiu Zhang
, Ting Zheng:
Global asymptotic stability of periodic solutions for delayed complex-valued Cohen-Grossberg neural networks by combining coincidence degree theory with LMI method. 220-230 - Ting Xie, Pengfei Ren, Taiping Zhang, Yuan Yan Tang:
Distribution preserving learning for unsupervised feature selection. 231-240 - Zhen Qin, Jin-Liang Wang
, Yan-Li Huang, Shun-Yan Ren:
Analysis and adaptive control for robust synchronization and H∞ synchronization of complex dynamical networks with multiple time-delays. 241-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.