Sciweavers

7742 search results - page 18 / 1549
» The Robustness of Level Sets
Sort
View
117
Voted
ICCD
2000
IEEE
119views Hardware» more  ICCD 2000»
15 years 4 months ago
Source-Level Transformations for Improved Formal Verification
A major obstacle to widespread acceptance of formal verification is the difficulty in using the tools effectively. Although learning the basic syntax and operation of a formal ver...
Brian D. Winters, Alan J. Hu
NDSS
2000
IEEE
15 years 4 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
156
Voted
BMCBI
2011
14 years 4 months ago
Gene set analysis for longitudinal gene expression data
Background: Gene set analysis (GSA) has become a successful tool to interpret gene expression profiles in terms of biological functions, molecular pathways, or genomic locations. ...
Ke Zhang, Haiyan Wang, Arne C. Bathke, Solomon W. ...
90
Voted
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 5 months ago
A Set Theory Based Approach on Applying Domain Semantics to XML Structures
As XML is gathering more and more importance in the field of data interchange in distributed business to business (B2B) applications, it is increasingly important to provide a for...
Wolfgang Schuetzelhofer, Karl M. Göschka
113
Voted
DAGM
2006
Springer
15 years 4 months ago
On-Line, Incremental Learning of a Robust Active Shape Model
Abstract. Active Shape Models are commonly used to recognize and locate different aspects of known rigid objects. However, they require an off-line learning stage, such that the ex...
Michael Fussenegger, Peter M. Roth, Horst Bischof,...