There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
The presented study deals with extraction of melodic line(s) from polyphonic audio recordings. We base our work on the use of expectation maximization algorithm, which is employed...
A software development unit called to renew or replace an existing corporate system may face some special problems in an established company with a lot of well-trained behavioral p...
We propose in this paper a new family of belief merging operators, that is based on a game between sources : Until a coherent set of sources is reached, at each round a contest is...
The neural computations that support bat echolocation are of great interest to both neuroscientists and engineers, due to the complex and extremely time-constrained nature of the ...