default search action
Ido Kanter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Elena Agliari, Francesco Alemanno, Miriam Aquaro, Adriano Barra, Fabrizio Durante, Ido Kanter:
Hebbian dreaming for small datasets. Neural Networks 173: 106174 (2024) - 2023
- [i19]Yuval Meir, Yarden Tzach, Ronit D. Gross, Ofek Tevet, Roni Vardi, Ido Kanter:
Enhancing the success rates by performing pooling decisions adjacent to the output layer. CoRR abs/2303.05800 (2023) - [i18]Yarden Tzach, Yuval Meir, Ofek Tevet, Ronit D. Gross, Shiri Hodassman, Roni Vardi, Ido Kanter:
The mechanism underlying successful deep learning. CoRR abs/2305.18078 (2023) - [i17]Yuval Meir, Yarden Tzach, Shiri Hodassman, Ofek Tevet, Ido Kanter:
Universality of underlying mechanism for successful deep learning. CoRR abs/2309.07537 (2023) - 2022
- [i16]Francesco Alemanno, Miriam Aquaro, Ido Kanter, Adriano Barra, Elena Agliari:
Supervised Hebbian learning: toward eXplainable AI. CoRR abs/2203.01304 (2022) - [i15]Shiri Hodassman, Yuval Meir, Karin Kisos, Itamar Ben-Noam, Yael Tugendhaft, Amir Goldental, Roni Vardi, Ido Kanter:
Brain inspired neuronal silencing mechanism to enable reliable sequence identification. CoRR abs/2203.13028 (2022) - [i14]Yuval Meir, Shira Sardi, Shiri Hodassman, Karin Kisos, Itamar Ben-Noam, Amir Goldental, Ido Kanter:
Power-law Scaling to Assist with Key Challenges in Artificial Intelligence. CoRR abs/2211.08430 (2022) - [i13]Yuval Meir, Ofek Tevet, Yarden Tzach, Shiri Hodassman, Ronit D. Gross, Ido Kanter:
Efficient shallow learning as an alternative to deep learning. CoRR abs/2211.11106 (2022) - [i12]Yuval Meir, Itamar Ben-Noam, Yarden Tzach, Shiri Hodassman, Ido Kanter:
Learning on tree architectures outperforms a convolutional feedforward network. CoRR abs/2211.11378 (2022)
2010 – 2019
- 2014
- [j8]Amir Goldental, Shoshana Guberman, Roni Vardi, Ido Kanter:
A computational paradigm for dynamic logic-gates in neuronal activity. Frontiers Comput. Neurosci. 8: 52 (2014) - 2010
- [j7]Noam Ordan, Victoria Itskovich, Miriam Shlesinger, Ido Kanter:
Lexical Richness Revisited: Blueprint for a More Economical Measure. J. Quant. Linguistics 17(1): 55-67 (2010) - [i11]Hadar Efraim, Nadav Yacov, Ori Shental, Ido Kanter:
An efficient CDMA decoder for correlated information sources. CoRR abs/1001.5135 (2010)
2000 – 2009
- 2008
- [j6]Ori Shental, Noam Shental, Shlomo Shamai, Ido Kanter, Anthony J. Weiss, Yair Weiss:
Discrete-Input Two-Dimensional Gaussian Channels With Memory: Estimation and Information Rates Via Graphical Models and Statistical Mechanics. IEEE Trans. Inf. Theory 54(4): 1500-1513 (2008) - [i10]Ori Shental, Ido Kanter:
Shannon Meets Carnot: Mutual Information Via Thermodynamics. CoRR abs/0806.3133 (2008) - [i9]Ido Kanter, Ori Shental, Hadar Efraim, Nadav Yacov:
Carnot in the Information Age: Discrete Symmetric Channels. CoRR abs/0807.4322 (2008) - 2006
- [j5]Ori Shental, Ido Kanter, Anthony J. Weiss:
Capacity of complexity-constrained noise-free CDMA. IEEE Commun. Lett. 10(1): 10-12 (2006) - [j4]Ido Kanter, Haggai Kfir, Brenda Malkiel, Miriam Shlesinger:
Identifying universals of text translation. J. Quant. Linguistics 13(1): 35-43 (2006) - [j3]Or Zuk, Eytan Domany, Ido Kanter, Michael Aizenman:
From Finite-System Entropy to Entropy Rate for a Hidden Markov Process. IEEE Signal Process. Lett. 13(9): 517-520 (2006) - [c7]Or Zuk, Eytan Domany, Ido Kanter, Michael Aizenman:
Taylor series expansions for the entropy rate of Hidden Markov Processes. ICC 2006: 1598-1604 - [i8]Einat Klein, Noam Gross, Evi Kopelowitz, Michael Rosenbluh, Lev Khaykovich, Wolfgang Kinzel, Ido Kanter:
Public-channel cryptography based on mutual chaos pass filters. CoRR abs/cond-mat/0604569 (2006) - [i7]Ori Shental, Ido Kanter:
Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly Spread CDMA. CoRR abs/cs/0604083 (2006) - [i6]Nadav Yacov, Hadar Efraim, Haggai Kfir, Ido Kanter, Ori Shental:
Parallel vs. Sequential Belief Propagation Decoding of LDPC Codes over GF(q) and Markov Sources. CoRR abs/cs/0605069 (2006) - 2005
- [c6]Or Zuk, Ido Kanter, Eytan Domany:
Asymptotics of the Entropy Rate for a Hidden Markov Process. DCC 2005: 173-182 - [i5]Or Zuk, Ido Kanter, Eytan Domany:
The Entropy of a Binary Hidden Markov Process. CoRR abs/cs/0507060 (2005) - [i4]Ori Shental, Ido Kanter, Anthony J. Weiss:
Capacity of Complexity-Constrained Noise-Free CDMA. CoRR abs/cs/0509048 (2005) - [i3]Ori Shental, Ido Kanter, Anthony J. Weiss:
On the Achievable Information Rates of CDMA Downlink with Trivial Receivers. CoRR abs/cs/0509049 (2005) - [i2]Or Zuk, Eytan Domany, Ido Kanter, Michael Aizenman:
Taylor series expansions for the entropy rate of Hidden Markov Processes. CoRR abs/cs/0510005 (2005) - [i1]Or Zuk, Eytan Domany, Ido Kanter, Michael Aizenman:
From finite-system entropy to entropy rate for a Hidden Markov Process. CoRR abs/cs/0510016 (2005) - 2004
- [c5]Rachel Mislovaty, Einat Klein, Ido Kanter, Wolfgang Kinzel:
Security of neural cryptography. ICECS 2004: 219-221 - [c4]Haggai Kfir, Ido Kanter:
Efficient LDPC codes for joint source-channel coding. ICECS 2004: 654-657 - [c3]Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas Ruttor, Wolfgang Kinzel:
Synchronization of neural networks by mutual learning and its application to cryptography. NIPS 2004: 689-696 - 2003
- [j2]Avner Priel, Ido Kanter:
Time Series Generation by Recurrent Neural Networks. Ann. Math. Artif. Intell. 39(3): 315-332 (2003)
1990 – 1999
- 1997
- [c2]Avner Priel, Ido Kanter, David A. Kessler:
Analytical Study of the Interplay between Architecture and Predictability. NIPS 1997: 315-321 - 1995
- [j1]Marcelo Blatt, Eytan Domany, Ido Kanter:
On the equivalence of two-layered perceptrons with binary neurons. Int. J. Neural Syst. 6(3): 225-231 (1995) - 1990
- [c1]Yann LeCun, Ido Kanter, Sara A. Solla:
Second Order Properties of Error Surfaces. NIPS 1990: 918-924
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint