Sciweavers

796 search results - page 25 / 160
» Spoofing prevention method
Sort
View
CVPR
2012
IEEE
12 years 8 days ago
Learning to segment dense cell nuclei with shape prior
We study the problem of segmenting multiple cell nuclei from GFP or Hoechst stained microscope images with a shape prior. This problem is encountered ubiquitously in cell biology ...
Xinghua Lou, Ullrich Köthe, Jochen Wittbrodt,...
ASIAN
2004
Springer
140views Algorithms» more  ASIAN 2004»
14 years 3 months ago
A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs
Natural images and photographs sometimes may contain stains or undesired objects covering significant portions of the images. Inpainting is a method to fill in such portions using ...
Feng Tang, Yiting Ying, Jin Wang, Qunsheng Peng
HASE
1999
IEEE
14 years 2 months ago
Lessons from 342 Medical Device Failures
Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and software quality assuranc...
Dolores R. Wallace, D. Richard Kuhn
IMAMS
2007
180views Mathematics» more  IMAMS 2007»
13 years 11 months ago
Implicit Boundary Control of Vector Field Based Shape Deformations
We present a shape deformation approach which preserves volume, prevents self-intersections and allows for exact control of the deformation impact. The volume preservation and prev...
Wolfram von Funck, Holger Theisel, Hans-Peter Seid...
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
14 years 2 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon