Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Abstract. In this article we propose a cardiac motion estimation technique that uses non-rigid registration to compute the dense cardiac displacement field from 2D ultrasound sequ...
Abstractions and Case-Based Reasoning for Medical Course Data: Two Prognostic Applications . . . . . . . . . . . . . . . . . 23 R. Schmidt and L. Gierl Are Case-Based Reasoning and...
Abstract. Gaussian convolutions are perhaps the most often used image operators in low-level computer vision tasks. Surprisingly though, there are precious few articles that descri...
Abstract—The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone ar...