In this paper, a method is introduced in order to qualify the performance of dynamic neural fields (DNF). The method is applied to Amari's DNF equations, in order to drive the...
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
Markov chain Monte Carlo has been the standard technique for inferring the posterior distribution of genome rearrangement scenarios under a Bayesian approach. We present here a neg...
We consider a visual scene analysis scenario where objects (e.g. people, cars) pass through the viewing field of a static camera and need to be detected and segmented from the bac...
Ali Taylan Cemgil, Wojciech Zajdel, Ben J. A. Kr&o...
— In this paper we investigate a realistic code acquisition assisted cooperative Non-Coherent (NC) Multiple-Input Multiple-Output (MIMO) DS-CDMA downlink scenario, when communica...