Sciweavers

2214 search results - page 196 / 443
» Dynamic Protocol Recovery
Sort
View
MICCAI
2009
Springer
16 years 2 months ago
Modeling Adaptation Effects in fMRI Analysis
The standard general linear model (GLM) for rapid event-related fMRI design protocols typically ignores reduction in hemodynamic responses in successive stimuli in a train due to i...
Wanmei Ou, Tommi Raij, Fa-Hsuan Lin, Polina Gollan...
ISBI
2006
IEEE
16 years 1 months ago
Automated segmentation of white matter lesions in 3D brain MR images, using multivariate pattern classification
This paper presents a fully automatic white matter lesion (WML) segmentation method, based on local features determined by combining multiple MR acquisition protocols, including T...
Abbas Jawad, Bilge Karaçali, Christos Davat...
ESORICS
2009
Springer
16 years 1 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
98
Voted
MOBILWARE
2009
ACM
15 years 7 months ago
A Mission Management Framework for Unmanned Autonomous Vehicles
Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. UA...
Eskindir Asmare, Anandha Gopalan, Morris Sloman, N...
ICSM
2008
IEEE
15 years 7 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos