The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Recent advances in low-power sensing devices coupled with the widespread availability of wireless ad-hoc networks have fueled the development of sensor networks. These are typical...
Amir Soheili, Vana Kalogeraki, Dimitrios Gunopulos
This paper presents an autostereoscopic three-dimensional (3-D) surgical display with high quality integral videography (IV) rendering algorithm. IV is an animated extension of int...
The interaction of the microtubules with the cell cortex plays numerous critical roles in a cell. For instance, it directs vesicle delivery, and modulates membrane adhesions pivota...
Stathis Hadjidemetriou, Derek Toomre, James S. Dun...
We propose a new Bayesian, stochastic tracking algorithm for the segmentation of blood vessels from 3D medical image data. Inspired by the recent developments in particle filterin...
David Lesage, Elsa D. Angelini, Isabelle Bloch, Ga...