The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
The conventional weighted aggregation method is extended to realize multi-objective optimization. The basic idea is that systematically changing the weights during evolution will l...
Current search engines cannot effectively rank those relational data, which exists on dynamic websites supported by online databases. In this study, to rank such structured data, ...
We introduce a new method for segmentation of 3D medical data based on geometric variational principles. A minimal variance criterion is coupled with a geometric edge alignment mea...
Michal Holtzman-Gazit, Dorith Goldsher, Ron Kimmel
In this paper we present a new method for self-localization on wafers using geometric hashing. The proposed technique is robust to image changes induced by process variations, as o...
Michael Lifshits, Roman Goldenberg, Ehud Rivlin, M...