In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Despite the recognition of cellular automata (CA) as a exible and powerful tool for urban growth simulation, the calibration of CA had been largely heuristic until recent eVorts to...
A multiresolution data decomposition offers a fundamental framework supporting compression, progressive transmission, and level-of-detail (LOD) control for large two or three dime...
Wenli Cai, Georgios Sakas, Roberto Grosso, Thomas ...
In this paper we present the updated version of the compilation of 5S rRNA and 5S rDNA nucleotide sequences. It contains 1622 primary structures of 5S rRNAs and 5S rRNA genes from...
Maciej Szymanski, Thomas Specht, Miroslawa Z. Barc...
This paper presents an adaptive structure self-organizing finite mixture network for quantification of magnetic resonance (MR) brain image sequences. We present justification fo...