Sciweavers

337 search results - page 47 / 68
» On Weak Markov's Principle
Sort
View
MICCAI
2004
Springer
14 years 8 months ago
Coupling Statistical Segmentation and PCA Shape Modeling
This paper presents a novel segmentation approach featuring shape constraints of multiple structures. A framework is developed combining statistical shape modeling with a maximum a...
Kilian M. Pohl, Simon K. Warfield, Ron Kikinis, W....
NTMS
2009
IEEE
14 years 2 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
ISW
2009
Springer
14 years 2 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
ICPR
2008
IEEE
14 years 2 months ago
IR and visible face recognition using fusion of kernel based features
In this paper we present the face recognition method using feature-level fusion where the infrared (IR) and visible face images are fused at transformed domain. The main contribut...
Shahbe Mat Desa, Subhas Hati
KBSE
2008
IEEE
14 years 2 months ago
Exploring the composition of unit test suites
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the ...
Bart Van Rompaey, Serge Demeyer