Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
In this paper we propose a new method for detecting straight line segments in digital images. It improves upon existing methods by giving precise results while controlling the num...
The exact localization of the mandibular nerve with respect to the bone is important for applications in dental implantology and maxillofacial surgery. Cone beam computed tomograph...
Dagmar Kainmueller, Hans Lamecker, Heiko Seim, ...
The purpose of this work was to develop an automatic boundary detection method for mammographic masses and to observe the method's performance on different four of the five m...
Lisa Kinnard, Shih-Chung Ben Lo, Erini Makariou, T...