Sciweavers

1508 search results - page 248 / 302
» A Toolbox of Level Set Methods
Sort
View
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
14 years 11 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
ECIS
2000
14 years 11 months ago
Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration
Nowadays, almost all public administration plan to establish processes with electronic signatures. For such processes, there are no standardized system models with test cases. We a...
B. Lapken, Frank Losemann, Thomas Engel, Christoph...
ATAL
2010
Springer
14 years 11 months ago
Success, strategy and skill: an experimental study
In many AI settings an agent is comprised of both actionplanning and action-execution components. We examine the relationship between the precision of the execution component, the...
Christopher Archibald, Alon Altman, Yoav Shoham
CMPB
2010
152views more  CMPB 2010»
14 years 10 months ago
Fast free-form deformation using graphics processing units
A large number of algorithms have been developed to perform non-rigid registration and it is a tool commonly used in medical image analysis. The FreeForm Deformation algorithm is ...
Marc Modat, Gerard R. Ridgway, Zeike A. Taylor, Ma...
CORR
2010
Springer
166views Education» more  CORR 2010»
14 years 10 months ago
Software Metrics Evaluation Based on Entropy
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...