Sciweavers

1054 search results - page 190 / 211
» Using Component Abstraction for Automatic Generation of Macr...
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 1 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
MICCAI
2008
Springer
15 years 10 months ago
A Bayesian Approach for Liver Analysis: Algorithm and Validation Study
Abstract. We present a new method for the simultaneous, nearly automatic segmentation of liver contours, vessels, and metastatic lesions from abdominal CTA scans. The method repeat...
Moti Freiman, Ofer Eliassaf, Yoav Taieb, Leo Jo...
CICLING
2009
Springer
15 years 10 months ago
Guessers for Finite-State Transducer Lexicons
Abstract. Language software applications encounter new words, e.g., acronyms, technical terminology, names or compounds of such words. In order to add new words to a lexicon, we ne...
Krister Lindén
ICRA
2009
IEEE
112views Robotics» more  ICRA 2009»
15 years 4 months ago
Combining planning and motion planning
Abstract— Robotic manipulation is important for real, physical world applications. General Purpose manipulation with a robot (eg. delivering dishes, opening doors with a key, etc...
Jaesik Choi, Eyal Amir
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng