Sciweavers

1891 search results - page 311 / 379
» Constrained Subspace Modelling
Sort
View
ISBI
2004
IEEE
14 years 9 months ago
Tomographic Reconstruction From an Uncontrolled Sensor Trajectory
For many medical procedures 3D bone models are built from Computed Tomography (CT) or Magnetic Resonance Imaging (MRI) data, both of which are expensive and time consuming, and un...
Chris Baker, Christian Debrunner, William Hoff, Ja...
ISBI
2008
IEEE
14 years 9 months ago
Medial-based Bayesian tracking for vascular segmentation: Application to coronary arteries in 3D CT angiography
We propose a new Bayesian, stochastic tracking algorithm for the segmentation of blood vessels from 3D medical image data. Inspired by the recent developments in particle filterin...
David Lesage, Elsa D. Angelini, Isabelle Bloch, Ga...
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
ICCD
2008
IEEE
146views Hardware» more  ICCD 2008»
14 years 6 months ago
Chip level thermal profile estimation using on-chip temperature sensors
—This paper addresses the problem of chip level thermal profile estimation using runtime temperature sensor readings. We address the challenges of a) availability of only a few t...
Yufu Zhang, Ankur Srivastava, Mohamed M. Zahran
ICCD
2006
IEEE
127views Hardware» more  ICCD 2006»
14 years 6 months ago
Power Droop Testing
Circuit activity is a function of input patterns. When circuit activity changes abruptly, it can cause sudden drop or rise in power supply voltage. This change is known as power d...
Ilia Polian, Alejandro Czutro, Sandip Kundu, Bernd...