We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
In some real world situations, linear models are not sufficient to represent accurately complex relations between input variables and output variables of a studied system. Multila...
Abstract Purpose: This paper presents the preliminary results of a semiautomatic method for prostate segmentation of Magnetic Resonance Images (MRI) which aims to be incorporated i...
Quantum error-correction codes (QECCs) are a vital ingredient of quantum computation and communication systems. In that context it is highly desirable to design QECCs that can be r...
Wh-phrases in English have two important properties: first, they can appear both raised and in-situ; second, while in-situ wh-phrases can take semantic scope beyond the immediately...