Sciweavers

5948 search results - page 1005 / 1190
» Computing Robust Counter-Strategies
Sort
View
126
Voted
ISBI
2007
IEEE
15 years 10 months ago
A Novel Tag Removal Technique for Tagged Cardiac Mri and Its Applications
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...
147
Voted
ISBI
2007
IEEE
15 years 10 months ago
Segmentation of Mammosphere Structures from Volumetric Data
3D cell culture assays have emerged as the basis of an improved model system for evaluating therapeutic agents, molecular probes, and exogenous stimuli. However, there is a gap in...
Ju Han, Hang Chang, Qing Yang, Mary Helen Barcello...
147
Voted
MMM
2007
Springer
178views Multimedia» more  MMM 2007»
15 years 10 months ago
Normalization and Alignment of 3D Objects Based on Bilateral Symmetry Planes
Abstract. Recent advancements in 3D scanning technologies have inspired the development of effective methods for matching and retrieving 3D objects. A common pre-processing stage ...
Jefry Tedjokusumo, Wee Kheng Leow
146
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 10 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
133
Voted
P2P
2007
IEEE
132views Communications» more  P2P 2007»
15 years 10 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
« Prev « First page 1005 / 1190 Last » Next »