Sciweavers

1548 search results - page 181 / 310
» Estimating Software Vulnerabilities
Sort
View
BILDMED
2009
170views Algorithms» more  BILDMED 2009»
15 years 18 days ago
Fuzzy Multiscale Region Growing for Segmentation of MR Images of the Human Brain
We propose an automatic region growing technique for the segmentation of the cerebral cortex and white matter in MRI data. Our method exploits general anatomical knowledge and uses...
Karin Engel, Frederik Maucksch, Anja Perlich, Matt...
EUROMICRO
2007
IEEE
15 years 5 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
WCE
2007
15 years 19 days ago
Utilising Refactoring To Restructure Use-Case Models
—Use case refactoring is one of the recent software engineering techniques that aimed at synthesising and refining use case models. Two new types of use case refactoring are prop...
Ayman Issa
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
15 years 12 months ago
Structured entity identification and document categorization: two tasks with one joint model
Traditionally, research in identifying structured entities in documents has proceeded independently of document categorization research. In this paper, we observe that these two t...
Indrajit Bhattacharya, Shantanu Godbole, Sachindra...
ACSAC
2009
IEEE
15 years 6 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...