Sciweavers

2714 search results - page 466 / 543
» Approximation Schemes for Scheduling
Sort
View
MICCAI
2006
Springer
16 years 1 months ago
Detection of Protrusions in Curved Folded Surfaces Applied to Automated Polyp Detection in CT Colonography
Over the past years many computer aided diagnosis (CAD) schemes have been presented for the detection of colonic polyps in CT Colonography. The vast majority of these methods (impl...
Cees van Wijk, Vincent Frans van Ravesteijn, Frans...
118
Voted
IPMI
2003
Springer
16 years 1 months ago
Velocity Estimation in Ultrasound Images: A Block Matching Approach
In this paper, we focus on velocity estimation in ultrasound images sequences. Ultrasound images present many difficulties in image processing because of the typically high level o...
Djamal Boukerroui, J. Alison Noble, Michael Brady
131
Voted
ICML
2007
IEEE
16 years 1 months ago
Discriminant kernel and regularization parameter learning via semidefinite programming
Regularized Kernel Discriminant Analysis (RKDA) performs linear discriminant analysis in the feature space via the kernel trick. The performance of RKDA depends on the selection o...
Jieping Ye, Jianhui Chen, Shuiwang Ji
97
Voted
ISBI
2004
IEEE
16 years 1 months ago
EEG Cortical Imaging: A Vector Field Approach for Laplacian Denoising and Missing Data Estimation
The surface Laplacian is known to be a theoretical reliable approximation of the cortical activity. Unfortunately, because of its high pass character and the relative low density ...
Teodor Alecu, Sviatoslav Voloshynovskiy, Thierry P...
103
Voted
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
16 years 1 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander