Sciweavers

12264 search results - page 2330 / 2453
» Analysis of the rubberband algorithm
Sort
View
139
Voted
MICCAI
2005
Springer
16 years 4 months ago
Automated Surface Matching Using Mutual Information Applied to Riemann Surface Structures
Many medical imaging applications require the computation of dense correspondence vector fields that match one surface with another. To avoid the need for a large set of manually-d...
Yalin Wang, Ming-Chang Chiang, Paul M. Thompson
124
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
SIGSOFT
2007
ACM
16 years 4 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
134
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
142
Voted
ISBI
2008
IEEE
16 years 4 months ago
Multiresolution identification of germ layer components in teratomas derived from human and nonhuman primate embryonic stem cell
We propose a system for identification of germ layer components in teratomas derived from human and nonhuman primate embryonic stem cells. Tissue regeneration and repair, drug tes...
Amina Chebira, John A. Ozolek, Carlos A. Castro, W...
« Prev « First page 2330 / 2453 Last » Next »