Author of the publication

Automatic Seed Placement for Breast Lesion Segmentation on US Images.

, , , , , , , and . Digital Mammography / IWDM, volume 7361 of Lecture Notes in Computer Science, page 308-315. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Statistical Approach for Breast Density Segmentation., , , , , , and . J. Digital Imaging, 23 (5): 527-537 (2010)Validation of a Nonintrusive Wearable Device for Distress Estimation During Robotic Roller Assisted Gait., , , , , , and . IWANN (1), volume 12861 of Lecture Notes in Computer Science, page 570-582. Springer, (2021)Comparison Between Wolfe, Boyd, BI-RADS and Tabár Based Mammographic Risk Assessment., , , , , and . Digital Mammography / IWDM, volume 4046 of Lecture Notes in Computer Science, page 407-415. Springer, (2006)Risk Classification of Mammograms Using Anatomical Linear Structure and Density Information., , , , and . IbPRIA (2), volume 4478 of Lecture Notes in Computer Science, page 186-193. Springer, (2007)Analysis of Anatomical Linear Structure Information in Mammographic Risk Assessment., , , , and . Digital Mammography / IWDM, volume 5116 of Lecture Notes in Computer Science, page 483-490. Springer, (2008)A review of automatic mass detection and segmentation in mammographic images., , , , , , and . Medical Image Anal., 14 (2): 87-110 (2010)Frailty Level Prediction in Older Age Using Hand Grip Strength Functions Over Time., , , , , , , , , and . IWANN (2), volume 12862 of Lecture Notes in Computer Science, page 356-366. Springer, (2021)Physical Exertion Recognition Using Surface Electromyography and Inertial Measurements for Occupational Ergonomics., , and . Sensors, 23 (22): 9100 (November 2023)WITDOM: Empowering Privacy and Security in Non-trusted Environments., and . ERCIM News, (2016)