Author of the publication

Evaluation of five image registration tools for abdominal CT: pitfalls and opportunities with soft anatomy.

, , , , , , and . Medical Imaging: Image Processing, volume 9413 of SPIE Proceedings, page 94131N. SPIE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-atlas segmentation for abdominal organs with Gaussian mixture models., , , , , , and . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, volume 9417 of SPIE Proceedings, page 941707. SPIE, (2015)Visual Firewall: Real-time Network Security Monito., , , , and . VizSEC, page 16. IEEE Computer Society, (2005)Recursive DNS Architectures and Vulnerability Implications., , , , , and . NDSS, The Internet Society, (2009)Evaluation of body-wise and organ-wise registrations for abdominal organs., , , , , , , and . Medical Imaging: Image Processing, volume 9784 of SPIE Proceedings, page 97841O. SPIE, (2016)Evaluation of five image registration tools for abdominal CT: pitfalls and opportunities with soft anatomy., , , , , , and . Medical Imaging: Image Processing, volume 9413 of SPIE Proceedings, page 94131N. SPIE, (2015)Forensic implications of Ext4., , and . CSIIRW, page 22. ACM, (2010)MobCast: Overlay Architecture for Seamless IP Mobility using Scalable Anycast Proxies., , , , , and . WCNC, page 3872-3876. IEEE, (2007)Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers., and . VizSEC, page 103-108. ACM, (2006)Goodput optimization in CSMA/CA wireless networks., , and . BROADNETS, page 880-888. IEEE, (2007)Towards complete node enumeration in a peer-to-peer botnet., , , , , , , , , and 1 other author(s). AsiaCCS, page 23-34. ACM, (2009)