In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
We describe a complete hardware/software system, dubbed Universal Real-Time Navigational Assistance (URNA), which enables communication of relevant location-aware information to a...
S. Bohonos, A. Lee, A. Malik, C. Thai, Roberto Man...
Dynamic adaptation has been an essential requirement for more and more business systems. Some research works have focused on the structural or behavioral changes of adaptive progr...
— In this paper we propose a sound recognition technique based on the limited receptive area (LIRA) neural classifier and short-time Fourier transform (STFT). LIRA neural classif...
Oleksandr Makeyev, Edward Sazonov, Stephanie A. C....
Cardiac computational models of electrical conduction, mechanical activation, hemodynamics and metabolism require detailed information about the structural arrangement of function...