Sciweavers

1508 search results - page 60 / 302
» A Toolbox of Level Set Methods
Sort
View

Publication
445views
16 years 6 months ago
Computational Study of Fast Methods For The Eikonal Equation
"A computational study of the Fast Marching and the Fast Sweeping methods for the Eikonal equation is given. It is shown that even though Fast Sweeping requires asymptotically...
Pierre A. Gremaud and Christopher M. Kuster
MICCAI
2009
Springer
15 years 7 months ago
A Two-Level Approach Towards Semantic Colon Segmentation: Removing Extra-Colonic Findings
Abstract. Computer aided detection (CAD) of colonic polyps in computed tomographic colonography has tremendously impacted colorectal cancer diagnosis using 3D medical imaging. It i...
Le Lu, Matthias Wolf, Jianming Liang, Murat Dundar...
VTS
2007
IEEE
135views Hardware» more  VTS 2007»
15 years 4 months ago
High Level Synthesis of Degradable ASICs Using Virtual Binding
—As the complexity of the integrated circuits increases, they become more susceptible to manufacturing faults, decreasing the total process yield. Thus, it would be desirable to ...
Nima Honarmand, A. Shahabi, Hasan Sohofi, Maghsoud...
ECUMN
2007
Springer
15 years 4 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
TON
1998
186views more  TON 1998»
14 years 9 months ago
Virtual path control for ATM networks with call level quality of service guarantees
— The configuration of virtual path (VP) connection services is expected to play an important role in the operation of large-scale asynchronous transfer mode (ATM) networks. A m...
Nikolaos Anerousis, Aurel A. Lazar