Sciweavers

2297 search results - page 373 / 460
» An Algorithm for Computing the Integral Closure
Sort
View
137
Voted
ISBI
2004
IEEE
16 years 3 months ago
Combining Fuzzy Logic and Level Set Methods for 3D MRI Brain Segmentation
We propose to segment volumetric brain structures with a level set method including a fuzzy decision in the design of the evolution force. The role of fuzzy logic is to fuse gradi...
Christian Barillot, Cybèle Ciofolo, Pierre ...
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 3 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
131
Voted
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 3 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
102
Voted
VLSID
2002
IEEE
119views VLSI» more  VLSID 2002»
16 years 3 months ago
Reducing Library Development Cycle Time through an Optimum Layout Create Flow
One of the major roadblocks in reduction of library generation cycle time is the layout generation phase. The two methods of doing automatic layout generation are synthesis and mig...
Rituparna Mandal, Dibyendu Goswami, Arup Dash
196
Voted
SIGMOD
2007
ACM
176views Database» more  SIGMOD 2007»
16 years 2 months ago
URank: formulation and efficient evaluation of top-k queries in uncertain databases
Top-k processing in uncertain databases is semantically and computationally different from traditional top-k processing. The interplay between query scores and data uncertainty ma...
Mohamed A. Soliman, Ihab F. Ilyas, Kevin Chen-Chua...