Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the ...
Hierarchies have been used for organization, summarization, and access to information, yet a lingering issue is how best to construct them. In this paper, our goal is to automatic...
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
We propose a novel method for fully automated segmentation and tracking of the myocardium and left and right ventricles (LV and RV) using 4D MR images. The method uses non-rigid re...
Daniel Rueckert, Gerardo I. Sanchez-Ortiz, Maria L...
In a previous work [26], by considering paths that are partially weighted, the generating function of Dyck paths was shown to possess a type of symmetry, called an exchange relati...