Sciweavers

1437 search results - page 152 / 288
» Content Extraction Signatures
Sort
View
ISBI
2006
IEEE
14 years 12 months ago
Tissue characterization and detection of dysplasia using scattered light
In this paper, the structural parameters of dysplasia formation in the epithelial tissue are estimated using a stochastic decomposition algorithm (SDM) by means of scattered light...
Fernand S. Cohen, Ezgi Taslidere, Dilip S. Hari
ISBI
2006
IEEE
14 years 12 months ago
Pattern recognition approaches to compute image similarities: application to age related morphological change
We are studying the genetic influence on rates of age related muscle degeneration in C. elegans. For this, we built pattern recognition tools to calculate a morphological score gi...
Nikita Orlov, Josiah Johnston, Tomasz J. Macura, C...
WWW
2009
ACM
14 years 12 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
CSIE
2009
IEEE
14 years 6 months ago
Supervised Control of a Flying Performing Robot Using Its Intrinsic Sound
We present the current results of our ongoing research in achieving efficient control of a flying robot for a wide variety of possible applications. A lightweight small indoor h...
Benjamin N. Passow, Sophy Smith, Mario A. Gó...
HOST
2008
IEEE
14 years 5 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach