Sciweavers

372 search results - page 16 / 75
» aim 2002
Sort
View
103
Voted
SIAMAM
2002
122views more  SIAMAM 2002»
14 years 9 months ago
A Level Set Method for Anisotropic Geometric Diffusion in 3D Image Processing
A new morphological multiscale method in 3D image processing is presented which combines the image processing methodology based on nonlinear diffusion equations and the theory of g...
Martin Rumpf, Tobias Preußer
TCS
2002
14 years 9 months ago
A characterization of c.e. random reals
A real is computably enumerable if it is the limit of a computable, increasing, converging sequence of rationals. A real is random if its binary expansion is a random sequence. Ou...
Cristian Calude
TIT
2002
96views more  TIT 2002»
14 years 9 months ago
An axiomatization of partition entropy
Abstract-- The aim of this paper is to present an axiomatization of a generalization of Shannon's entropy starting from partitions of finite sets. The proposed axiomatization ...
Dan A. Simovici, Szymon Jaroszewicz
87
Voted
TMI
2002
88views more  TMI 2002»
14 years 9 months ago
What is the best similarity measure for motion correction in fMRI time series?
It has been shown that the difference of squares cost function used by standard realignment packages (SPM and AIR) can lead to the detection of spurious activations, because the mo...
Luis Freire, Alexis Roche, Jean-Francois Mangin
AIM
2002
14 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe