Sciweavers

1646 search results - page 270 / 330
» Automatic generation of two-party computations
Sort
View
ACL
2010
13 years 8 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
CMIG
2011
168views more  CMIG 2011»
13 years 1 months ago
Comparing axial CT slices in quantized N-dimensional SURF descriptor space to estimate the visible body region
In this paper, a method is described to automatically estimate the visible body region of a computed tomography (CT) volume image. In order to quantify the body region, a body coo...
Johannes Feulner, Shaohua Kevin Zhou, Elli Angelop...
ICIP
2000
IEEE
14 years 11 months ago
Orientation Template Matching for Face Localization in Complex Visual Scenes
An important topic in face recognition as well as in video coding or multi-modal human machine interfaces is the automatic localization of faces or headand-shoulder regions in vis...
Bernhard Fröba, Christian Küblbeck
MICCAI
2008
Springer
14 years 11 months ago
A Bayesian Approach for Liver Analysis: Algorithm and Validation Study
Abstract. We present a new method for the simultaneous, nearly automatic segmentation of liver contours, vessels, and metastatic lesions from abdominal CTA scans. The method repeat...
Moti Freiman, Ofer Eliassaf, Yoav Taieb, Leo Jo...
DAC
2003
ACM
14 years 11 months ago
Clock-tree power optimization based on RTL clock-gating
As power consumption of the clock tree in modern VLSI designs tends to dominate, measures must be taken to keep it under control. This paper introduces an approach for reducing cl...
Monica Donno, Alessandro Ivaldi, Luca Benini, Enri...