Sciweavers

7228 search results - page 138 / 1446
» From Algorithmic to Subjective Randomness
Sort
View
128
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Network Coding Tomography for Network Failures
—Network Tomography (or network monitoring) uses end-to-end path-level measurements to characterize the network, such as topology estimation and failure detection. This work prov...
Hongyi Yao, Sidharth Jaggi, Minghua Chen
144
Voted
ICCV
2011
IEEE
14 years 3 months ago
Segmentation from a Box
Drawing a box around an intended segmentation target has become both a popular user interface and a common output for learning-driven detection algorithms. Despite the ubiquity of...
Leo Grady, Marie-Pierre Jolly, Aaron Seitz

Presentation
1518views
17 years 4 months ago
Stochastic Segmentation of Blood Vessels From Time-of-Flight
In this paper, we present an automatic statistical approach for extracting 3D blood vessels from time-of-flight (TOF) magnetic resonance angiography (MRA) data. The voxels of the d...
M. Sabry Hassouna
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
ALGORITHMICA
2006
161views more  ALGORITHMICA 2006»
15 years 3 months ago
The Expected Size of the Rule k Dominating Set
Dai, Li, and Wu proposed Rule k, a localized approximation algorithm that attempts to find a small connected dominating set in a graph. In this paper we consider the "average...
Jennie C. Hansen, Eric Schmutz, Li Sheng