Sciweavers

2254 search results - page 86 / 451
» Computing the minimal covering set
Sort
View
ICCV
2005
IEEE
16 years 2 months ago
A Shape-Based Segmentation Approach: An Improved Technique Using Level Sets
We propose a novel approach for shape-based segmentation based on a specially designed level set function format. This format permits us to better control the process of object re...
Hossam E. Abd El Munim, Aly A. Farag
FPL
2004
Springer
119views Hardware» more  FPL 2004»
15 years 4 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
110
Voted
ICPR
2000
IEEE
16 years 1 months ago
Cooperation between Level Set Techniques and Dense 3D Registration for the Segmentation of Brain Structures
This paper presents a cooperative strategy between volumetric registration and segmentation. The segmentation method is based on the level set formalism. Starting from an initial ...
C. Baillard, Pierre Hellier, Christian Barillot
126
Voted
IBERAMIA
2004
Springer
15 years 6 months ago
Applying Rough Sets Reduction Techniques to the Construction of a Fuzzy Rule Base for Case Based Reasoning
Early work on Case Based Reasoning reported in the literature shows the importance of soft computing techniques applied to different stages of the classical 4-step CBR life cycle. ...
Florentino Fdez-Riverola, Fernando Díaz, Ju...
93
Voted
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz