Sciweavers

7978 search results - page 1485 / 1596
» Combining shared-coin algorithms
Sort
View
MICCAI
2003
Springer
15 years 10 months ago
Assessing Early Brain Development in Neonates by Segmentation of High-Resolution 3T MRI
Abstract. This paper describes effort towards automatic tissue segmentation in neonatal MRI. Extremely low contrast to noise ratio (CNR), regional intensity changes due to RF coil ...
Guido Gerig, Marcel Prastawa, Weili Lin, John H. G...
IPMI
2005
Springer
15 years 10 months ago
Segmenting and Tracking the Left Ventricle by Learning the Dynamics in Cardiac Images
Having accurate left ventricle (LV) segmentations across a cardiac cycle provides useful quantitative (e.g. ejection fraction) and qualitative information for diagnosis of certain ...
Alan S. Willsky, Godtfred Holmvang, Müjdat &C...
ICSE
2008
IEEE-ACM
15 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
SIGSOFT
2008
ACM
15 years 10 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
SIGSOFT
2008
ACM
15 years 10 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
« Prev « First page 1485 / 1596 Last » Next »