Jiri Novotný

Learn More
We derive the first ever on-shell recursion relations applicable to effective field theories. Based solely on factorization and the soft behavior of amplitudes, these recursion relations employ a new rescaling momentum shift to construct all tree-level scattering amplitudes in the nonlinear sigma model, Dirac-Born-Infeld theory, and the Galileon. Our(More)
These days the problem of cyber security is of utmost importance. Massive cyber attacks targeting government and mission critical servers can swiftly become an issue of national security. Various approaches for cyber defence and cyber security used to date have been based on software solutions without hardware acceleration. With the increasing number of(More)
Evaluating Optical Music Recognition (OMR) is notoriously difficult and automated end-to-end OMR evaluation metrics are not available to guide development. In " Towards a Standard Testbed for Optical Music Recognition: Definitions, Metrics, and Page Images " , Byrd and Simon-sen recently stress that a benchmarking standard is needed in the OMR community,(More)
Music has been always an integral part of human culture. In our computer age, it is not surprising that there is a growing interest to store music in a digitized form. Optical music recognition (OMR) refers to a discipline that investigates music score recognition systems. This is similar to well-known optical character recognition systems, except OMR(More)
This paper presents an RFID outdoor localization system that is able to localize hundreds of active transponders in the area of one square kilometer using three RFID receiving stations. The RFID outdoor locator is designed for the tracking of casualties during mass disasters. Active transponders are included in triage tags that are fastened to all(More)
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of several anomaly detection techniques by means of collective trust modeling within a group of collaborative detection agents, each featuring a specific detection algorithm. The(More)