|
Search the dblp DataBase
Arun Sood:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yih Huang, David Arsenault, Arun Sood
Securing DNS Services through System Self Cleansing and Hardware Enhancements. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:132-139 [Conf]
- Yih Huang, David Arsenault, Arun Sood
Closing Cluster Attack Windows Through Server Redundancy and Rotations. [Citation Graph (0, 0)][DBLP] CCGRID, 2006, pp:21- [Conf]
- Jeffrey Solomon, John A. Butman, Arun Sood
Segmentation of objects in temporal images using the hidden Markov model. [Citation Graph (0, 0)][DBLP] ICIP (1), 2005, pp:1-4 [Conf]
- Jeffrey Solomon, Arun Sood
4-D Lesion Detection Using Expectation-Maximization and Hidden Markov Model. [Citation Graph (0, 0)][DBLP] ISBI, 2004, pp:125-128 [Conf]
- Jeffrey Solomon, John A. Butman, Arun Sood
Data Driven Brain Tumor Segmentation in MRI Using Probabilistic Reasoning over Space and Time. [Citation Graph (0, 0)][DBLP] MICCAI (1), 2004, pp:301-309 [Conf]
- Mubarak Shah, Arun Sood, Ramesh Jain
Pulse and staircase edge models. [Citation Graph (0, 0)][DBLP] Computer Vision, Graphics, and Image Processing, 1986, v:34, n:3, pp:321-343 [Journal]
- Yih Huang, David Arsenault, Arun Sood
SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:1, pp:5-19 [Journal]
- Jeffrey Solomon, John A. Butman, Arun Sood
Segmentation of brain tumors in 4D MR images using the hidden Markov model. [Citation Graph (0, 0)][DBLP] Computer Methods and Programs in Biomedicine, 2006, v:84, n:2-3, pp:76-85 [Journal]
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). [Citation Graph (, )][DBLP]
Incorruptible system self-cleansing for intrusion tolerance. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|