We present a new approach for the coarse segmentation of tubular structures in 3D image data. Our algorithm, which requires only few initial values and minimal user interaction, c...
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
— Protection against failure in high bandwidth optical networks can prevent significant potential losses of data but at the same time it requires a considerable fraction of the ...
Amir Askarian, Yuxiang Zhai, Suresh Subramaniam, Y...
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...