Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Tetralogy of Fallot (ToF) is a severe congenital heart disease that mainly affects the right ventricle (RV). It requires surgical repair early in infancy. Chronic regurgitations ma...
Tommaso Mansi, Stanley Durrleman, Boris Bernhardt,...
High quality obstetric images have become readily available with fast magnetic resonance imaging protocols or new 3D ultrasound probes. These obstetric images provide detailed info...
Juan Pablo de la Plata Alcalde, Lazar Bibin, J&eac...
We present a Dynamic Data Driven Application System (DDDAS) to track 2D shapes across large pose variations by learning non-linear shape manifold as overlapping, piecewise linear s...