Results 251 to 260 of about 1,407,158 (281)
Digital tumour board solution enhances case preparation time and reduces postponements: an implementer report. [PDF]
Brne K +5 more
europepmc +1 more source
Real-Time Multi-Channel Epileptic Seizure Detection Exploiting an Ultra-Low-Complexity Algorithm-Hardware Co-Design Approach. [PDF]
Vittimberga A, Nicolini G, Scotti G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
FPGA Implementation of Unimodal Thresholding
2021 10th Mediterranean Conference on Embedded Computing (MECO), 2021Thresholding is a very simple image processing procedure that is commonly used for segmentation or edge detection. The final result of thresholding is significantly affected by the used threshold value. The several methods for determining the optimal threshold have been developed.
Miroslav Hagara +3 more
openaire +1 more source
Information Cascades and Threshold Implementation
SSRN Electronic Journal, 2019Economic activities such as crowdfunding often involve sequential interactions, observational learning, and project implementation contingent on achieving certain thresholds of support. We incorporate endogenous all-or-nothing thresholds in a classic model of information cascade. We find that early supporters tap the wisdom of a later "gate-keeper" and
Lin Cong, Yizhou Xiao
openaire +1 more source
Lattice-Based Threshold Signature Implementation for Constrained Devices
Proceedings of the 20th International Conference on Security and Cryptography, 2023Threshold signatures have gained increased attention especially due to their recent applications in blockchain technologies. In fact, current cryptocurrencies such as Bitcoin, and Cardano started to support multi-signature transactions. Even if the Schnorr-based threshold signatures improve the blockchain's privacy and scalability, these schemes do not
Dobiáš, Patrik +4 more
openaire +2 more sources
Design Trade-offs in Threshold Implementations
2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2019With the expansion of the IoT and the emergence of vast amounts of remote hardware devices side-channel attacks pose a serious threat, requiring adequate protection. Among the hardware countermeasures, Threshold Implementations (TI) is one of the most used ones. It is designed to avoid the leakage of sensitive data from hardware designs.
Dušan Božilov +2 more
openaire +1 more source
Thresholding implemented in the frequency domain
IEEE Transactions on Image Processing, 2001Image processing procedures are usually carried out in the spatial domain where the images are acquired and presented/utilized. The linear nature of the Fourier transform allows only those operations that are linear to be mapped into the frequency domain.
openaire +3 more sources
Thresholds' Wellness Management and Recovery Implementation
American Journal of Psychiatric Rehabilitation, 2009As part of Thresholds' mission to enhance the recovery orientation of practices, we began a systematic implementation of the Illness Management and Recovery toolkit throughout the agency. Although the toolkit materials are being used as published, the name of the practice was changed to reflect a strengths-based orientation: Wellness Management and ...
MARY RYCHENER +3 more
openaire +1 more source
Threshold Implementations in Industry
Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, 2016Implementing efficient countermeasures against side-channel attacks is a challenge since two decades. Especially in hardware, many masking countermeasure implementations failed due to first-order leakages caused by glitches or other effects such as early evaluation and unbalanced routing.
openaire +1 more source

