Results 251 to 260 of about 1,407,158 (281)

Digital tumour board solution enhances case preparation time and reduces postponements: an implementer report. [PDF]

open access: yesBMJ Health Care Inform
Brne K   +5 more
europepmc   +1 more source

FPGA Implementation of Unimodal Thresholding

2021 10th Mediterranean Conference on Embedded Computing (MECO), 2021
Thresholding is a very simple image processing procedure that is commonly used for segmentation or edge detection. The final result of thresholding is significantly affected by the used threshold value. The several methods for determining the optimal threshold have been developed.
Miroslav Hagara   +3 more
openaire   +1 more source

Information Cascades and Threshold Implementation

SSRN Electronic Journal, 2019
Economic activities such as crowdfunding often involve sequential interactions, observational learning, and project implementation contingent on achieving certain thresholds of support. We incorporate endogenous all-or-nothing thresholds in a classic model of information cascade. We find that early supporters tap the wisdom of a later "gate-keeper" and
Lin Cong, Yizhou Xiao
openaire   +1 more source

Lattice-Based Threshold Signature Implementation for Constrained Devices

Proceedings of the 20th International Conference on Security and Cryptography, 2023
Threshold signatures have gained increased attention especially due to their recent applications in blockchain technologies. In fact, current cryptocurrencies such as Bitcoin, and Cardano started to support multi-signature transactions. Even if the Schnorr-based threshold signatures improve the blockchain's privacy and scalability, these schemes do not
Dobiáš, Patrik   +4 more
openaire   +2 more sources

Design Trade-offs in Threshold Implementations

2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2019
With the expansion of the IoT and the emergence of vast amounts of remote hardware devices side-channel attacks pose a serious threat, requiring adequate protection. Among the hardware countermeasures, Threshold Implementations (TI) is one of the most used ones. It is designed to avoid the leakage of sensitive data from hardware designs.
Dušan Božilov   +2 more
openaire   +1 more source

Thresholding implemented in the frequency domain

IEEE Transactions on Image Processing, 2001
Image processing procedures are usually carried out in the spatial domain where the images are acquired and presented/utilized. The linear nature of the Fourier transform allows only those operations that are linear to be mapped into the frequency domain.
openaire   +3 more sources

Thresholds' Wellness Management and Recovery Implementation

American Journal of Psychiatric Rehabilitation, 2009
As part of Thresholds' mission to enhance the recovery orientation of practices, we began a systematic implementation of the Illness Management and Recovery toolkit throughout the agency. Although the toolkit materials are being used as published, the name of the practice was changed to reflect a strengths-based orientation: Wellness Management and ...
MARY RYCHENER   +3 more
openaire   +1 more source

Threshold Implementations in Industry

Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, 2016
Implementing efficient countermeasures against side-channel attacks is a challenge since two decades. Especially in hardware, many masking countermeasure implementations failed due to first-order leakages caused by glitches or other effects such as early evaluation and unbalanced routing.
openaire   +1 more source

Home - About - Disclaimer - Privacy