Sciweavers

503 search results - page 69 / 101
» Verifying Quantitative Properties Using Bound Functions
Sort
View
134
Voted
ISBI
2004
IEEE
16 years 3 months ago
Cardiac MR Image Segmentation: Quality Assessment of STACS
We present an energy based automatic image segmentation algorithm that uses a novel active contour scheme, called the stochastic active contour scheme (STACS). The algorithm overc...
Charnchai Pluempitiwiriyawej, Chien Ho, José...
120
Voted
BIBE
2005
IEEE
115views Bioinformatics» more  BIBE 2005»
15 years 8 months ago
GOMIT: A Generic and Adaptive Annotation Algorithm Based on Gene Ontology Term Distributions
We address the issue of providing highly informative annotations using information revealed by the structured vocabularies of Gene Ontology (GO). For a target, a set of candidate ...
In-Yee Lee, Jan-Ming Ho, Ming-Syan Chen
127
Voted
WINET
2010
199views more  WINET 2010»
15 years 26 days ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
131
Voted
SACMAT
2005
ACM
15 years 8 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
139
Voted
SIGSOFT
2003
ACM
16 years 3 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler