Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 436
1.
  • Fine-Tuning Convolutional N... Fine-Tuning Convolutional Neural Networks for Biomedical Image Analysis: Actively and Incrementally
    Zhou, Zongwei; Shin, Jae; Zhang, Lei ... 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 07/2017
    Conference Proceeding
    Open access

    Intense interest in applying convolutional neural networks (CNNs) in biomedical image analysis is wide spread, but its success is impeded by the lack of large annotated datasets in biomedical ...
Full text
Available for: IJS, NUK, UL, UM

PDF
2.
  • A Truncated Nuclear Norm Re... A Truncated Nuclear Norm Regularization Method Based on Weighted Residual Error for Matrix Completion
    Liu, Qing; Lai, Zhihui; Zhou, Zongwei ... IEEE transactions on image processing, 2016-Jan., 2016-Jan, 2016-1-00, 20160101, Volume: 25, Issue: 1
    Journal Article
    Peer reviewed

    Low-rank matrix completion aims to recover a matrix from a small subset of its entries and has received much attention in the field of computer vision. Most existing methods formulate the task as a ...
Full text
Available for: IJS, NUK, UL
3.
  • Dual L1-Normalized Context ... Dual L1-Normalized Context Aware Tensor Power Iteration and Its Applications to Multi-object Tracking and Multi-graph Matching
    Hu, Weiming; Shi, Xinchu; Zhou, Zongwei ... International journal of computer vision, 02/2020, Volume: 128, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    The multi-dimensional assignment problem is universal for data association analysis such as data association-based visual multi-object tracking and multi-graph matching. In this paper, ...
Full text
Available for: CEKLJ, DOBA, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, IZUM, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, SIK, UILJ, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
4.
  • Comparison of machine learn... Comparison of machine learning methods for classifying mediastinal lymph node metastasis of non-small cell lung cancer from 18F-FDG PET/CT images
    Wang, Hongkai; Zhou, Zongwei; Li, Yingci ... EJNMMI research, 01/2017, Volume: 7, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Background This study aimed to compare one state-of-the-art deep learning method and four classical machine learning methods for classifying mediastinal lymph node metastasis of non-small cell lung ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
5.
  • Acquiring Weak Annotations ... Acquiring Weak Annotations for Tumor Localization in Temporal and Volumetric Data
    Yu-Cheng, Chou; Bowen, Li; Deng-Ping, Fan ... International journal of automation and computing, 04/2024, Volume: 21, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Creating large-scale and well-annotated datasets to train AI algorithms is crucial for automated tumor detection and localization. However, with limited resources, it is challenging to determine the ...
Full text
Available for: UPUK
6.
  • Ginkgolide B improves multi... Ginkgolide B improves multiterritory perforator flap survival by inhibiting endoplasmic reticulum stress and oxidative stress
    Lin, Damu; Wu, Hongqiang; Zhou, Zongwei ... Journal of investigative surgery, 07/2021, Volume: 34, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    The therapeutics used to promote perforator flap survival function induces vascular regeneration and inhibit apoptosis. The present study aimed to explore the potential mechanism of the angiogenesis ...
Full text
Available for: DOBA, IJS, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
7.
  • Building Verifiable Trusted... Building Verifiable Trusted Path on Commodity x86 Computers
    Zongwei Zhou; Gligor, V. D.; Newsome, J. ... 2012 IEEE Symposium on Security and Privacy
    Conference Proceeding
    Open access

    A trusted path is a protected channel that assures the secrecy and authenticity of data transfers between a user's input/output (I/O) device and a program trusted by that user. We argue that, despite ...
Full text
Available for: IJS, NUK, UL, UM

PDF
8.
  • Recent progress in research... Recent progress in research of congenital polydactyly
    Gao, Weiyang; Ding, Jian; Zhou, Zongwei Zhongguo xiu fu chong jian wai ke za zhi, 07/2018, Volume: 32, Issue: 7
    Journal Article
    Peer reviewed

    Surgery is still the main treatment for congenital polydactyly, and the aim of surgical reconstruction is to obtain a thumb with excellent function and appearance. A systematic assessment of ...
Full text
Available for: NUK, UL, UM, UPUK
9.
  • Dancing with Giants: Wimpy ... Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O
    Zongwei Zhou; Miao Yu; Gligor, Virgil D. 2014 IEEE Symposium on Security and Privacy
    Conference Proceeding
    Open access

    To be trustworthy, security-sensitive applications must be formally verified and hence small and simple, i.e., wimpy. Thus, they cannot include a variety of basic services available only in large and ...
Full text
Available for: IJS, NUK, UL, UM
10.
  • Two-dimension principal com... Two-dimension principal component analysis-based motion detection framework with subspace update of background
    Zhou, Zongwei; Jin, Zhong IET computer vision, 09/2016, Volume: 10, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Object detection plays a critical role for automatic video analysis in many vision applications. Background subtraction has been the mainstream in the field of moving objects detection. However, most ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
1 2 3 4 5
hits: 436

Load filters