Author of the publication

Deformable models for random small-size objects: Case of lung nodules in CT tomography.

, , and . ICASSP, page 1090-1093. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Enhancements for Distributed Control Systems., , and . Critical Infrastructure Protection, volume 253 of IFIP, page 133-146. Springer, (2007)Active Learning Mashups for Tablet Classrooms., and . CATA, page 60-65. ISCA, (2011)Improving the cyber security of SCADA communication networks., , and . Commun. ACM, 52 (7): 139-142 (2009)FMECA Control for Software Development.. COMPSAC (2), page 93-96. IEEE Computer Society, (2005)0-7695-2413-3.Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot., and . CATA, page 184-189. ISCA, (2005)Research issues in robot safety.. ICRA, page 1854-1855. IEEE Computer Society, (1988)An Approach to Parallel Data Mining for Pharmacophore Discovery., , and . IS, page 100-103. ISCA, (2001)Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture., , and . IS, page 23-26. ISCA, (2001)Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining., , and . CSB, page 400-402. IEEE Computer Society, (2003)Designing Security-Hardened Microkernels For Field Devices., and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 129-140. Springer, (2008)