Sciweavers

2265 search results - page 325 / 453
» Recovering Exchanged Data
Sort
View
ECCV
2004
Springer
14 years 3 months ago
A Multi-scale Geometric Flow for Segmenting Vasculature in MRI
Often in neurosurgical planning a dual echo acquisition is performed that yields proton density (PD) and T2-weighted images to evaluate edema near a tumour or lesion. The developme...
Maxime Descoteaux, D. Louis Collins, Kaleem Siddiq...
IWDW
2004
Springer
14 years 3 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
PCM
2004
Springer
119views Multimedia» more  PCM 2004»
14 years 3 months ago
Temporal Error Concealment with Block Boundary Smoothing
Abstract. When a block is lost due to a transmission error in compressed bitstream, conventional temporal error concealment schemes try to conceal the lost block by recovering its ...
Woong Il Choi, Byeungwoo Jeon
WABI
2004
Springer
142views Bioinformatics» more  WABI 2004»
14 years 3 months ago
Linear Reduction for Haplotype Inference
Abstract. Haplotype inference problem asks for a set of haplotypes explaining a given set of genotypes. Popular software tools for haplotype inference (e.g., PHASE, HAPLOTYPER) as ...
Jingwu He, Alexander Zelikovsky
DISCEX
2003
IEEE
14 years 3 months ago
Improving Failure Responsiveness in Jini Leasing
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevi...