Sciweavers

954 search results - page 59 / 191
» From brains to bytes
Sort
View
IEEESP
2006
130views more  IEEESP 2006»
14 years 10 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
ASPLOS
2006
ACM
14 years 12 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
JOCN
2011
94views more  JOCN 2011»
14 years 4 months ago
ERP Correlates of Word Production before and after Stroke in an Aphasic Patient
■ Changes in brain activity characterizing impaired speech production after brain damage have usually been investigated by comparing aphasic speakers with healthy subjects becau...
Marina Laganaro, Stéphanie Morand, Christop...
ISBI
2006
IEEE
15 years 10 months ago
Tracking cortical surface deformations based on vessel structure using a laser range scanner
This paper reports a vessel structure based non-rigid registration method for cortical surface registration and deformation tracking using a laser-range scanner(LRS). The LRS cont...
Aize Cao, Prashanth Dumpuri, Michael I. Miga
MICCAI
2008
Springer
15 years 11 months ago
Joint Segmentation of Thalamic Nuclei from a Population of Diffusion Tensor MR Images
Abstract. Several recent studies explored the use of unsupervised segmentation methods for segmenting thalamic nuclei from diffusion tensor images. These methods provide a plausibl...
Ulas Ziyan, Carl-Fredrik Westin