Sciweavers

2236 search results - page 364 / 448
» Intrusion detection techniques and approaches
Sort
View
TMI
2008
195views more  TMI 2008»
13 years 9 months ago
A Multichannel Watershed-Based Segmentation Method for Multispectral Chromosome Classification
Multiplex fluorescent in situ hybridization (M-FISH) is a recently developed chromosome imaging technique where each chromosome class appears to have a distinct color. This techniq...
Petros S. Karvelis, Alexandros T. Tzallas, Dimitri...
TMI
2008
109views more  TMI 2008»
13 years 9 months ago
Efficient Multilevel Brain Tumor Segmentation With Integrated Bayesian Model Classification
Abstract-- We present a new method for automatic segmentation of heterogeneous image data that takes a step toward bridging the gap between bottom-up affinity-based segmentation me...
Jason J. Corso, Eitan Sharon, S. Dube, Suzie El-Sa...
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 8 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ICST
2010
IEEE
13 years 7 months ago
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes
—Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for anal...
Mijung Kim, Saurabh Sinha, Carsten Görg, Hina...
ASPDAC
2010
ACM
152views Hardware» more  ASPDAC 2010»
13 years 7 months ago
Slack redistribution for graceful degradation under voltage overscaling
Modern digital IC designs have a critical operating point, or "wall of slack", that limits voltage scaling. Even with an errortolerance mechanism, scaling voltage below a...
Andrew B. Kahng, Seokhyeong Kang, Rakesh Kumar, Jo...