Sciweavers

2236 search results - page 407 / 448
» Intrusion detection techniques and approaches
Sort
View
ECCV
2004
Springer
14 years 1 months ago
Computer-Aided Measurement of Solid Breast Tumor Features on Ultrasound Images
This paper presents a new approach in the application of computer vision techniques to the diagnosis of solid breast tumors on ultrasound images. Most works related to medical imag...
Miguel Alemán-Flores, Patricia Alemá...
SETN
2004
Springer
14 years 1 months ago
Computationally Intelligent Methods for Mining 3D Medical Images
We present novel intelligent tools for mining 3D medical images. We focus on detecting discriminative Regions of Interest (ROIs) and mining associations between their spatial distr...
Despina Kontos, Vasileios Megalooikonomou, Fillia ...
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
14 years 1 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...
AINA
2010
IEEE
14 years 28 days ago
CAPTCHA Using Strangeness in Machine Translation
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
14 years 15 days ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...