Sciweavers

5948 search results - page 1119 / 1190
» Computing Robust Counter-Strategies
Sort
View
ISVC
2009
Springer
15 years 4 months ago
A Novel Method for Enhanced Needle Localization Using Ultrasound-Guidance
Abstract. In this paper, we propose a novel and fast method to localize and track needles during image-guided interventions. Our proposed method is comprised of framework of needle...
Bin Dong, Eric Savitsky, Stanley Osher
KSEM
2009
Springer
15 years 4 months ago
A Competitive Learning Approach to Instance Selection for Support Vector Machines
Abstract. Support Vector Machines (SVM) have been applied successfully in a wide variety of fields in the last decade. The SVM problem is formulated as a convex objective function...
Mario Zechner, Michael Granitzer
MIRAGE
2009
Springer
15 years 4 months ago
Interpreting Face Images by Fitting a Fast Illumination-Based 3D Active Appearance Model
Abstract. We present a fast and robust iterative method for interpreting face images under non-uniform lighting conditions by using a fitting algorithm which utilizes an illuminat...
Salvador E. Ayala-Raggi, Leopoldo Altamirano Roble...
SCALESPACE
2009
Springer
15 years 4 months ago
A Multi-scale Feature Based Optic Flow Method for 3D Cardiac Motion Estimation
Abstract. The dynamic behavior of the cardiac muscle is strongly dependent on heart diseases. Optic flow techniques are essential tools to assess and quantify the contraction of t...
Alessandro Becciu, Hans C. van Assen, Luc Florack,...
SERSCISA
2009
Springer
15 years 4 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
« Prev « First page 1119 / 1190 Last » Next »