Sciweavers

1518 search results - page 150 / 304
» Cryptographic Test Correction
Sort
View
TMI
1998
140views more  TMI 1998»
15 years 3 months ago
Automated Seeded Lesion Segmentation on Digital Mammograms
Abstract—Segmenting lesions is a vital step in many computerized mass-detection schemes for digital (or digitized) mammograms. We have developed two novel lesion segmentation tec...
Matthew A. Kupinski, Maryellen L. Giger
RAID
2010
Springer
15 years 2 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
TPDS
2010
89views more  TPDS 2010»
15 years 2 months ago
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
—Various sensor types, e.g., temperature, humidity, and acoustic, sense physical phenomena in different ways, and thus, are expected to have different sensing models. Even for th...
Mohamed Hefeeda, Hossein Ahmadi
EMNLP
2010
15 years 1 months ago
A Fast Decoder for Joint Word Segmentation and POS-Tagging Using a Single Discriminative Model
We show that the standard beam-search algorithm can be used as an efficient decoder for the global linear model of Zhang and Clark (2008) for joint word segmentation and POS-taggi...
Yue Zhang 0004, Stephen Clark
ACCV
2009
Springer
16 years 2 months ago
Estimating Human Pose from Occluded Images
We address the problem of recovering 3D human pose from single 2D images, in which the pose estimation problem is formulated as a direct nonlinear regression from image observation...
Jia-Bin Huang and Ming-Hsuan Yang