Sciweavers

1421 search results - page 87 / 285
» The First and Second Max-SAT Evaluations
Sort
View
MICCAI
2010
Springer
13 years 7 months ago
Automatic Detection and Segmentation of Axillary Lymph Nodes
Lymph node detection and measurement is a difficult and important part of cancer treatment. In this paper we present a robust and effective learning-based method for the automatic...
Adrian Barbu, Michael Sühling, Xun Xu, David ...
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 7 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
CCR
2005
129views more  CCR 2005»
13 years 8 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft
IACR
2011
125views more  IACR 2011»
12 years 8 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
CVPR
2007
IEEE
14 years 11 months ago
Capturing People in Surveillance Video
This paper presents reliable techniques for detecting, tracking, and storing keyframes of people in surveillance video. The first component of our system is a novel face detector ...
Rogerio Feris, Ying-li Tian, Arun Hampapur