Joos Vandewalle
Affiliations:- Catholic University of Leuven, Belgium
According to our database1,
Joos Vandewalle
authored at least 236 papers
between 1974 and 2016.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 1992, "For contributions to the mathematics of nonlinear circuits and systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2016
The crucial role of mathematics in circuits, systems and signal processing research and education.
Proceedings of the Signal Processing: Algorithms, 2016
2015
Analytical representation of the state-dependent coefficients in the SDRE/SDDRE scheme for multivariable systems.
Autom., 2015
2014
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset.
Inf. Sci., 2014
2013
Proceedings of Eurocon 2013, 2013
2012
Reducing the Number of Support Vectors of SVM Classifiers Using the Smoothed Separable Case Approximation.
IEEE Trans. Neural Networks Learn. Syst., 2012
Shortcuts in circuits and systems education with a case study of the Thévenin/Helmholtz and Norton/Mayer equivalents.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
Visualizing high dimensional datasets using parallel coordinates: Application to gene prioritization.
Proceedings of the 12th IEEE International Conference on Bioinformatics & Bioengineering, 2012
2011
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
2010
A concepts inventory for an attractive teaching approach of the mathematics of circuits and systems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Important questions related to the education of the mathematics of circuits and systems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
2009
Critical issues and current views on teaching basic circuits and systems in electrical engineering education.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
2008
Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier.
Int. J. Embed. Syst., 2008
2007
Super-Resolution From Unregistered and Totally Aliased Signals Using Subspace Methods.
IEEE Trans. Signal Process., 2007
Neural Networks, 2007
Int. J. Bifurc. Chaos, 2007
State-of-the-Art and Evolution in Public Data Sets and Competitions for System Identification, Time Series Prediction and Pattern Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
Int. J. Circuit Theory Appl., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
2005
A prewhitening-induced bound on the identification error in independent component analysis.
IEEE Trans. Circuits Syst. I Regul. Pap., 2005
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree <i>l</i> and order <i>k</i>.
Inf. Process. Lett., 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
2004
IEEE Trans. Circuits Syst. I Regul. Pap., 2004
Computation of the Canonical Decomposition by Means of a Simultaneous Generalized Schur Decomposition.
SIAM J. Matrix Anal. Appl., 2004
Int. J. Circuit Theory Appl., 2004
Comput. Artif. Intell., 2004
A double scroll based true random bit generator.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Proceedings of the Neural Information Processing, 11th International Conference, 2004
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004
Dimensionality Reduction in ICA and Rank-(R<sub>1</sub>, R<sub>2</sub>, ..., R<sub>N</sub>) Reduction in Multilinear Algebra.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2004
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions.
ACM Trans. Internet Techn., 2003
IEEE Trans. Neural Networks, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the 11th European Symposium on Artificial Neural Networks, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003
2002
Neural Process. Lett., 2002
Bayesian Framework for Least-Squares Support Vector Machine Classifiers, Gaussian Processes, and Kernel Fisher Discriminant Analysis.
Neural Comput., 2002
Combining World Wide Web and wireless security.
Informatica (Slovenia), 2002
Neurocomputing, 2002
Neurocomputing, 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Public Key Cryptography, 2002
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Artificial Neural Networks, 2002
World Scientific, ISBN: 978-981-4487-59-7, 2002
2001
Independent component analysis and (simultaneous) third-order tensor diagonalization.
IEEE Trans. Signal Process., 2001
Financial time series prediction using least squares support vector machines within the evidence framework.
IEEE Trans. Neural Networks, 2001
Int. J. Neural Syst., 2001
Int. J. Bifurc. Chaos, 2001
Int. J. Bifurc. Chaos, 2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Artificial Neural Networks in Hydrological Watershed Modeling: Surface Flow Contribution from the Ungauged Parts of a Catchment.
Proceedings of the 13th IEEE International Conference on Tools with Artificial Intelligence, 2001
Proceedings of the Artificial Neural Networks, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
Automatic relevance determination for Least Squares Support Vector Machines classifiers.
Proceedings of the 9th European Symposium on Artificial Neural Networks, 2001
Proceedings of the E-Commerce Agents, 2001
Secure Meeting Scheduling with agenTA.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
Extended Bayesian Regression Models: A Symbiotic Application of Belief Networks and Multilayer Perceptrons for the Classification of Ovarian Tumors.
Proceedings of the Artificial Intelligence Medicine, 2001
2000
IEEE Trans. Neural Networks Learn. Syst., 2000
Constructing fuzzy models with linguistic integrity from numerical data-AFRELI algorithm.
IEEE Trans. Fuzzy Syst., 2000
IEEE Trans. Biomed. Eng., 2000
On the Best Rank-1 and Rank-(<i>R</i><sub>1</sub> , <i>R</i><sub>2</sub>, ... , <i>R<sub>N</sub></i>) Approximation of Higher-Order Tensors.
SIAM J. Matrix Anal. Appl., 2000
Int. J. Bifurc. Chaos, 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000
Proceedings of the IEEE International Conference on Acoustics, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the 10th European Signal Processing Conference, 2000
Proceedings of the 8th European Symposium on Artificial Neural Networks, 2000
Proceedings of the 8th European Symposium on Artificial Neural Networks, 2000
1999
J. VLSI Signal Process., 1999
Training multilayer perceptron classifiers based on a modified support vector method.
IEEE Trans. Neural Networks, 1999
Lur'e systems with multilayer perceptron and recurrent neural networks: absolute stability and dissipativity.
IEEE Trans. Autom. Control., 1999
Int. J. Circuit Theory Appl., 1999
Guest editorial: Special issue on communications, information processing and control using chaos.
Int. J. Circuit Theory Appl., 1999
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999
Proceedings of the International Joint Conference Neural Networks, 1999
Proceedings of the International Joint Conference Neural Networks, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the 5th European Control Conference, 1999
Proceedings of the 7th European Symposium on Artificial Neural Networks, 1999
1998
Int. J. Circuit Theory Appl., 1998
Int. J. Circuit Theory Appl., 1998
Eur. J. Control, 1998
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998
Proceedings of the 9th European Signal Processing Conference, 1998
Improved generalization ability of neurocontrollers by imposing NLq stability constraints.
Proceedings of the 6th European Symposium on Artificial Neural Networks, 1998
Proceedings of the 6th European Symposium on Artificial Neural Networks, 1998
Proceedings of the 6th European Symposium on Artificial Neural Networks, 1998
1997
NL<sub>q</sub> theory: checking and imposing stability of recurrent neural networks for nonlinear modeling.
IEEE Trans. Signal Process., 1997
An improved stochastic gradient algorithm for principal component analysis and subspace tracking.
IEEE Trans. Signal Process., 1997
Improved methods for exponential parameter estimation in the presence of known poles and noise.
IEEE Trans. Signal Process., 1997
NL<sub>q</sub> Theory: A Neural Control Framework with Global Asymptotic Stability Criteria.
Neural Networks, 1997
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
How to trust systems.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Advances in Neural Information Processing Systems 10, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of International Conference on Neural Networks (ICNN'97), 1997
Proceedings of the Artificial Neural Networks, 1997
Proceedings of the Financial Cryptography, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the 5th Eurorean Symposium on Artificial Neural Networks, 1997
1996
Bandpass prefiltering for exponential data fitting with known frequency region of interest.
Signal Process., 1996
Int. J. Circuit Theory Appl., 1996
Int. J. Circuit Theory Appl., 1996
Int. J. Circuit Theory Appl., 1996
Statistical characterization and optimization of integrated circuits based on singular value decomposition.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996
State-space based approximation methods for the harmonic retrieval problem in the presence of known signal poles.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996
Proceedings of the 8th European Signal Processing Conference, 1996
Proceedings of the 8th European Signal Processing Conference, 1996
Proceedings of the 4th European Symposium on Artificial Neural Networks, 1996
A Restrictive Blind Signature Scheme with Applications to Electronic Cash.
Proceedings of the Communications and Multimedia Security II, 1996
Proceedings of the Advances in Cryptology, 1996
Artificial neural networks for modelling and control of non-linear systems.
Kluwer, ISBN: 978-0-7923-9678-9, 1996
1995
Efficient identification of RBF neural net models for nonlinear discrete-time multivariable dynamical systems.
Neurocomputing, 1995
A New Learning Algorithm for RBF Neural Networks with Applications to Nonlinear System Identification.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995
Generalized Cellular Neural Networks Represented in he NL<i><sub>q</sub></i> Framework.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995
Proceedings of the Cryptography and Coding, 1995
On the identification of a chaotic system by means of recurrent neural state space models.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995
Global asymptotic stability criteria for multilayer recurrent neural networks with applications to modelling and control.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995
Proceedings of the 3rd European Symposium on Artificial Neural Networks, 1995
Proceedings of the 3rd European Symposium on Artificial Neural Networks, 1995
1994
Static and dynamic stabilizing neural controllers, applicable to transition between equilibrium points.
Neural Networks, 1994
J. Parallel Distributed Comput., 1994
J. Circuits Syst. Comput., 1994
Neurocomputing, 1994
Predictive Control of Nonlinear Systems Based on Identification by Backpropagation Networks.
Int. J. Neural Syst., 1994
Closse Approximations of Sigmoid Functions by Sum of Step for VLSI Implementation of Neural Networks.
Sci. Ann. Cuza Univ., 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the 2nd European Symposium on Artificial Neural Networks, 1994
1993
IEEE Trans. Signal Process., 1993
Int. J. Neural Syst., 1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the 1st European Symposium on Artificial Neural Networks, 1993
Proceedings of the 1st European Symposium on Artificial Neural Networks, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
SIAM J. Matrix Anal. Appl., 1992
The generalized linear complementarity problem and an algorithm to find all its solutions.
Math. Program., 1992
Int. J. Neural Syst., 1992
A path-following method for finding multiple equilibrium points in cellular neural networks.
Int. J. Circuit Theory Appl., 1992
Proceedings of the Computer Security, 1992
Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
J. VLSI Signal Process., 1991
A square root covariance algorithm for constrained recursive least squares estimation.
J. VLSI Signal Process., 1991
A note on 'Efficient numerically stabilized rank-one eigenstructure updating' [and reply].
IEEE Trans. Signal Process., 1991
J. Parallel Distributed Comput., 1991
J. Circuits Syst. Comput., 1991
Proceedings of the Advances in Cryptology, 1991
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Total least squares problem - computational aspects and analysis.
Frontiers in applied mathematics 9, SIAM, ISBN: 978-0-89871-275-9, 1991
1990
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1990
IEEE Trans. Biomed. Eng., 1990
Int. J. Circuit Theory Appl., 1990
Proceedings of the IJCNN 1990, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Neural Networks, 1990
1989
On the accuracy of total least squares and least squares techniques in the presence of errors on all data.
Autom., 1989
Proceedings of the IEEE International Conference on Acoustics, 1989
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
Proceedings of the Advances in Cryptology, 1989
Proceedings of the 26th ACM/IEEE Design Automation Conference, 1989
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.
Proceedings of the Advances in Cryptology, 1989
1988
IEEE J. Solid State Circuits, June, 1988
IEEE Trans. Acoust. Speech Signal Process., 1988
Architectural strategies for an application-specific synchronous multiprocessor environment.
IEEE Trans. Acoust. Speech Signal Process., 1988
SAMURAI: A general and efficient simulated-annealing schedule with fully adaptive annealing parameters.
Integr., 1988
A geometrical approach for the identification of state space models with singular value decomposition.
Proceedings of the IEEE International Conference on Acoustics, 1988
Proceedings of the IEEE International Conference on Acoustics, 1988
1987
Two Methods for Optimal MECG Elimination and FECG Detection from Skin Electrode Signals.
IEEE Trans. Biomed. Eng., 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
Additional Properties in the S-Boxes of the DES.
EUROCRYPT, 1986
1985
Proceedings of the IEEE International Conference on Acoustics, 1985
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System.
Proceedings of the Advances in Cryptology, 1985
1984
IEEE Trans. Inf. Theory, 1984
Cryptography: How to Attack, What to Protect?
Proceedings of the IEEE International Conference on Communications: Links for the Future, 1984
Efficient CAD tools for the coefficient optimisation of arbitrary integrated digital filters.
Proceedings of the IEEE International Conference on Acoustics, 1984
1983
Analytical Characteristics of the DES.
Proceedings of the Advances in Cryptology, 1983
1975
IEEE Trans. Inf. Theory, 1975
IEEE Trans. Computers, 1975
1974
IEEE Trans. Computers, 1974