In this paper, we introduce a semi-automated segmentation method based on minimizing the Geodesic Active Contour energy incorporating a shape prior. We increase the robustness of t...
Manuel Werlberger, Thomas Pock, Markus Unger, Hors...
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
A generic and retargetable tool flow is presented that enables the export of timing data from software running on a cycle-accurate Virtual Prototype (VP) to a concurrent function...
Trevor Meyerowitz, Alberto L. Sangiovanni-Vincente...
In this paper, we consider the interaction between application programmers and tools that automatically search a space of application-level parameters that are believed to impact ...
Yiinju L. Nelson, Bhupesh Bansal, Mary W. Hall, Ai...
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...