Sciweavers

1585 search results - page 145 / 317
» A framework for computer-aided validation
Sort
View
IPMI
2009
Springer
16 years 4 months ago
Nonnegative Mixed-Norm Preconditioning for Microscopy Image Segmentation
Abstract. Image segmentation in microscopy, especially in interferencebased optical microscopy modalities, is notoriously challenging due to inherent optical artifacts. We propose ...
Kang Li, Takeo Kanade
ISBI
2006
IEEE
16 years 4 months ago
Automatic landmark detection in uterine cervix images for indexing in a content-retrieval system
This work is motivated by the need for visual information extraction and management in the growing field of content based image retrieval from medical archives. In particular it f...
Gali Zimmerman, Shiri Gordon, Hayit Greenspan
ESORICS
2009
Springer
16 years 4 months ago
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
Mihhail Aizatulin, Henning Schnoor, Thomas Wilke
ICIAP
2009
ACM
16 years 4 months ago
Multi-class Binary Symbol Classification with Circular Blurred Shape Models
Multi-class binary symbol classification requires the use of rich descriptors and robust classifiers. Shape representation is a difficult task because of several symbol distortions...
Sergio Escalera, Alicia Fornés, Oriol Pujol...
138
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 3 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton