Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
We propose a novel energy term to make the curve evolution quite robust to spurious edges. The physical intuition behind the formulation is that an object edge is generally contin...
In this paper, a method to automatically extract the main information from a long-term electrocardiographic signal is presented. This method is based on techniques of pattern reco...
We developed a software tool for pre-operative simulation and planning, and intra-operative guidance, of minimally invasive tumor ablation, including radiofrequency-, laser- and cr...
Torsten Butz, Simon K. Warfield, Kemal Tuncali, St...
Analyzing sequence data has become increasingly important recently in the area of biological sequences, text documents, web access logs, etc. In this paper, we investigate the pro...