Sciweavers

1071 search results - page 189 / 215
» Solving Geometric Constraint Systems
Sort
View
107
Voted
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 3 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
ATAL
2009
Springer
15 years 4 months ago
Actor-agent application for train driver rescheduling
This paper describes the design, implementation, visualizations, results and lessons learned of a novel real-world socio-technical research system for the purpose of rescheduling ...
Erwin J. W. Abbink, David G. A. Mobach, Pieter-Jan...
CVPR
2004
IEEE
15 years 11 months ago
A Unified Framework for Uncertainty Propagation in Automatic Shape Tracking
Uncertainty handling plays an important role during shape tracking. We have recently shown that the fusion of measurement information with system dynamics and shape priors greatly...
Xiang Sean Zhou, Dorin Comaniciu, Binglong Xie, R....
MICCAI
2008
Springer
15 years 10 months ago
Segmenting Brain Tumors Using Pseudo-Conditional Random Fields
Locating Brain tumor segmentation within MR (magnetic resonance) images is integral to the treatment of brain cancer. This segmentation task requires classifying each voxel as eith...
Chi-Hoon Lee, Shaojun Wang, Albert Murtha, Matt...
70
Voted
ICPR
2006
IEEE
15 years 10 months ago
Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling
Magnetic resonance imaging (MRI) allows numerous Fourier domain sampling schemes such as Cartesian and non-Cartesian trajectories (e.g. Polar, circular, and spherical). On the oth...
Hassan Foroosh, Mais Alnasser, Murat Balci