Brain surface conformal mapping has been studied intensively. In this paper, we propose a method that computes a conformal mapping from a multiply connected mesh to the so-called ...
Yalin Wang, Xianfeng Gu, Tony F. Chan, Paul M. Tho...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
—In this paper we present APOS, a method for dynamically adapting the parameters of IEEE 802.11g to the estimated system state, with the aim of enhancing the quality of a voice c...
—At present wireless devices are able to select their working frequency only to a limited extend although several measurements have shown that the current spectrum regulations ar...
Matthias Wellens, Alexandre de Baynast, Petri M&au...
— Underground mine galleries can be considered as complex transmission lines where multipath, attenuation, reflection, diffraction and scattering effects are dominants. However, ...
Abdellah Chehri, Paul Fortier, Pierre-Martin Tardi...