Sciweavers

892 search results - page 150 / 179
» Calculating with Requirements
Sort
View
101
Voted
ICIP
2009
IEEE
16 years 1 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
103
Voted
MICCAI
2004
Springer
16 years 1 months ago
Image Registration by Hierarchical Matching of Local Spatial Intensity Histograms
We previously presented a HAMMER image registration algorithm that demonstrated high accuracy in superposition of images from different individual brains. However, the HAMMER regis...
Dinggang Shen
77
Voted
ISBI
2008
IEEE
16 years 1 months ago
Ultrasound strain imaging: From nano-scale motion detection to macro-scale functional imaging
With ultrasound strain imaging, the function of tissue and organs can be identified. The technique uses multiple images, acquired from tissue under different degrees of deformatio...
Chris L. de Korte, Richard G. P. Lopata, Maartje M...
126
Voted
KDD
2004
ACM
135views Data Mining» more  KDD 2004»
16 years 1 months ago
Discovering additive structure in black box functions
Many automated learning procedures lack interpretability, operating effectively as a black box: providing a prediction tool but no explanation of the underlying dynamics that driv...
Giles Hooker
CADE
2004
Springer
16 years 1 months ago
The ICS Decision Procedures for Embedded Deduction
contexts such as construction of abstractions, speed may be favored over completeness, so that undecidable theories (e.g., nonlinear integer arithmetic) and those whose decision pr...
Leonardo Mendonça de Moura, Sam Owre, Haral...