Sciweavers

165 search results - page 33 / 33
» Reasoning about the Role of Information Systems in Trusting ...
Sort
View
TMI
2011
182views more  TMI 2011»
13 years 4 days ago
Active Volume Models for Medical Image Segmentation
—In this paper, we propose a novel predictive model, active volume model (AVM), for object boundary extraction. It is a dynamic “object” model whose manifestation includes a ...
Tian Shen, Hongsheng Li, Xiaolei Huang
CVPR
2009
IEEE
15 years 10 days ago
Active Volume Models for 3D Medical Image Segmentation
In this paper, we propose a novel predictive model for object boundary, which can integrate information from any sources. The model is a dynamic “object” model whose manifes...
Tian Shen (Lehigh University), Hongsheng Li (Lehig...
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 5 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
SOUPS
2010
ACM
13 years 9 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
EUROPAR
2006
Springer
13 years 9 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...