School of Arts and Sciences

Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

collisions Physics & Astronomy
quarks Physics & Astronomy
decay Physics & Astronomy
protons Physics & Astronomy
luminosity Physics & Astronomy
cross sections Physics & Astronomy
detectors Physics & Astronomy
galaxies Physics & Astronomy

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 1985 2022

research institution
Muscle Development
Muscle Cells
Transcription Factors
Stem Cells

Research Output 1962 2019

3D LV Probabilistic Segmentation in Cardiac MRI Using Generative Adversarial Network

Yang, D., Liu, B., Axel, L. & Metaxas, D., Jan 1 2019, Statistical Atlases and Computational Models of the Heart. Atrial Segmentation and LV Quantification Challenges - 9th International Workshop, STACOM 2018, Held in Conjunction with MICCAI 2018, Revised Selected Papers. Li, S., McLeod, K., Young, A., Rhode, K., Pop, M., Zhao, J., Mansi, T. & Sermesant, M. (eds.). Springer Verlag, p. 181-190 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11395 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computation theory
Left Ventricle
Magnetic Resonance Imaging
Medical Imaging
Medical imaging

A Bayesian framework for the development of belief-desire reasoning: Estimating inhibitory power

Wang, L., Hemmer, P. & Leslie, A., Feb 15 2019, In : Psychonomic Bulletin and Review. 26, 1, p. 205-221 17 p.

Research output: Contribution to journalArticle

Theory of Mind
Power (Psychology)
Belief-desire Reasoning

A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G. P., Gallos, L. & Fefferman, N. H., Jan 1 2019, In : Journal of Cyber Security and Mobility. 8, 1, p. 113-132 20 p.

Research output: Contribution to journalArticle

Network protocols
Network layers
Denial-of-service attack