Sciweavers

24188 search results - page 474 / 4838
» Computing on Encrypted Data
Sort
View
ENGL
2007
100views more  ENGL 2007»
15 years 5 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
JCNS
2000
86views more  JCNS 2000»
15 years 4 months ago
Computational Modeling of Orientation Tuning Dynamics in Monkey Primary Visual Cortex
In the primate visual pathway, orientation tuning of neurons is first observed in the primary visual cortex. The LGN cells that comprise the thalamic input to V1 are not orientati...
M. C. Pugh, Dario L. Ringach, Robert Shapley, M. J...
TMI
2010
160views more  TMI 2010»
15 years 3 months ago
Computer-Aided Detection of Polyps in CT Colonography Using Logistic Regression
—We present a computer-aided detection (CAD) system for computed tomography colonography that orders the polyps according to clinical relevance. The CAD system consists of two st...
Vincent Frans van Ravesteijn, Cees van Wijk, Frans...
COMPGEOM
2009
ACM
15 years 2 months ago
Geometric tomography: a limited-view approach for computed tomography
Computed tomography(CT), especially since the introduction of helical CT, provides excellent visualization of the internal organs of the body. As a result, CT is used routinely in...
Peter B. Noël, Jinhui Xu, Kenneth R. Hoffmann...
ISVC
2009
Springer
15 years 11 months ago
Parallel 3D Image Segmentation of Large Data Sets on a GPU Cluster
In this paper, we propose an inherent parallel scheme for 3D image segmentation of large volume data on a GPU cluster. This method originates from an extended Lattice Boltzmann Mod...
Aaron Hagan, Ye Zhao