Sciweavers

4565 search results - page 676 / 913
» Time Optimal Self-Stabilizing Algorithms
Sort
View
MIA
2011
170views more  MIA 2011»
14 years 7 months ago
Robust statistical shape models for MRI bone segmentation in presence of small field of view
Accurate bone modeling from medical images is essential in the diagnosis and treatment of patients because it supports the detection of abnormal bone morphology, which is often re...
Jérôme Schmid, Jinman Kim, Nadia Magn...
CCS
2011
ACM
14 years 23 days ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 10 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
113
Voted
DAC
2010
ACM
14 years 7 months ago
Node addition and removal in the presence of don't cares
This paper presents a logic restructuring technique named node addition and removal (NAR). It works by adding a node into a circuit to replace an existing node and then removing t...
Yung-Chih Chen, Chun-Yao Wang
PAMI
2011
14 years 7 months ago
Multiview Stereo and Silhouette Consistency via Convex Functionals over Convex Domains
—We propose a convex formulation for silhouette and stereo fusion in 3D reconstruction from multiple images. The key idea is to show that the reconstruction problem can be cast a...
Daniel Cremers, Kalin Kolev