Sciweavers

3238 search results - page 84 / 648
» Not Enough Points Is Enough
Sort
View
ISBI
2008
IEEE
14 years 10 months ago
Advanced level-set based multiple-cell segmentation and tracking in time-lapse fluorescence microscopy images
Segmentation and tracking of cells in fluorescence microscopy image sequences is an important task in many biological studies into cell migration as well as intracellular dynamics...
Oleh Dzyubachyk, Wiro J. Niessen, Erik H. W. Meije...
PPOPP
2009
ACM
14 years 10 months ago
A comparison of programming models for multiprocessors with explicitly managed memory hierarchies
On multiprocessors with explicitly managed memory hierarchies (EMM), software has the responsibility of moving data in and out of fast local memories. This task can be complex and...
Scott Schneider, Jae-Seung Yeom, Benjamin Rose, Jo...
SIGMOD
2005
ACM
107views Database» more  SIGMOD 2005»
14 years 10 months ago
Relational Confidence Bounds Are Easy With The Bootstrap
Statistical estimation and approximate query processing have become increasingly prevalent applications for database systems. However, approximation is usually of little use witho...
Abhijit Pol, Chris Jermaine
ESORICS
2002
Springer
14 years 9 months ago
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identit...
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
TCC
2010
Springer
231views Cryptology» more  TCC 2010»
14 years 7 months ago
A Domain Extender for the Ideal Cipher
We describe the first domain extender for ideal ciphers, i.e. we show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Our construc...
Jean-Sébastien Coron, Yevgeniy Dodis, Avrad...