Author of the publication

Resolve Intraoperative Brain Shift as Imitation Game.

, , , , , , , and . POCUS/BIVPCS/CuRIOUS/CPM@MICCAI, volume 11042 of Lecture Notes in Computer Science, page 129-137. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of state-of-the-art hardware architectures for fast cone-beam CT reconstruction., , , , and . Parallel Computing, 38 (3): 111-124 (2012)State space construction and steady-state solution of GSPNs on a shared-memory multiprocessor., , and . PNPM, page 112-121. IEEE, (1997)A photon recycling approach to the denoising of ultra-low dose X-ray sequences., , , , , , , and . Int. J. Comput. Assist. Radiol. Surg., 13 (6): 847-854 (2018)Robust Seed Mask Generation for Interactive Image Segmentation., , , and . CoRR, (2017)Resolve Intraoperative Brain Shift as Imitation Game., , , , , , , and . POCUS/BIVPCS/CuRIOUS/CPM@MICCAI, volume 11042 of Lecture Notes in Computer Science, page 129-137. Springer, (2018)A Fourier-Based Approach to the Angiographic Assessment of Flow Diverter Efficacy in the Treatment of Cerebral Aneurysms., , , , , and . IEEE Trans. Med. Imaging, 33 (9): 1788-1802 (2014)An analytical approach for the simulation of realistic low-dose fluoroscopic images., , , , , and . Int. J. Comput. Assist. Radiol. Surg., 14 (4): 601-610 (2019)A machine learning pipeline for internal anatomical landmark embedding based on a patient surface model., , , , , and . Int. J. Comput. Assist. Radiol. Surg., 14 (1): 53-61 (2019)Data locality optimizations for iterative numerical algorithms and cellular automata on hierarchical memory architectures.. Advances in simulation Society for Modeling and Simulation International, (2004)A Tool Suite for Simulation Based Analysis of Memory Access Behavior., , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 440-447. Springer, (2004)