Nuclear explosion produce immediate and delayed destructive effects, so identifying parameters has become inevitable for detecting nuclear tests conducted anywhere in the world. T...
A computational model of the peripheral auditory system is used to explain the paradoxical observation that discriminating between broadband noise sounds with and without high-fre...
Enrique A. Lopez-Poveda, Ana Alves-Pinto, Alan R. ...
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Technological and business changes influence the evolution of software systems. When this happens, the software artifacts may need to be adapted to the changes. This need is rapidl...
In this paper we summarize our results for two classes of hierarchical multi-scale models that exploit contextual information for detection of structure in mammographic imagery. T...