Sciweavers

48 search results - page 9 / 10
» Issues in the Practical Use of Graph Rewriting
Sort
View
MICCAI
2009
Springer
13 years 10 months ago
Bayesian Maximal Paths for Coronary Artery Segmentation from 3D CT Angiograms
We propose a recursive Bayesian model for the delineation of coronary arteries from 3D CT angiograms (cardiac CTA) and discuss the use of discrete minimal path techniques as an eļ¬...
David Lesage, Elsa D. Angelini, Isabelle Bloch, Ga...
INFOCOM
2009
IEEE
14 years 20 hour ago
Tracking with Unreliable Node Sequences
ā€”Tracking mobile targets using sensor networks is a challenging task because of the impacts of in-the-ļ¬led factors such as environment noise, sensing irregularity and etc. This...
Ziguo Zhong, Ting Zhu, Dan Wang, Tian He
CSL
2010
Springer
13 years 5 months ago
Discriminative training of HMMs for automatic speech recognition: A survey
Recently, discriminative training (DT) methods have achieved tremendous progress in automatic speech recognition (ASR). In this survey article, all mainstream DT methods in speech...
Hui Jiang
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 5 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
CCS
2009
ACM
14 years 5 days ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu