Sciweavers

826 search results - page 25 / 166
» Medical Requirements for Data Protection
Sort
View
VMV
2001
248views Visualization» more  VMV 2001»
14 years 11 months ago
Using an Extended Hough Transform Combined with a Kalman Filter to Segment Tubular Structures in 3D Medical Images
We present a new approach for the coarse segmentation of tubular structures in 3D image data. Our algorithm, which requires only few initial values and minimal user interaction, c...
Thorsten Behrens, Karl Rohr, H. Siegfried Stiehl
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 3 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
DAC
1998
ACM
15 years 10 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 4 months ago
Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study
— Protection against failure in high bandwidth optical networks can prevent significant potential losses of data but at the same time it requires a considerable fraction of the ...
Amir Askarian, Yuxiang Zhai, Suresh Subramaniam, Y...
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 1 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...