Author of the publication

Generation of a cohort of whole-torso cardiac models for assessing the utility of a novel computed shock vector efficiency metric for ICD optimisation.

, , , , , , , , , , , and . Comp. in Bio. and Med., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Authentication for End-to-End Encryption., , , , , and . WAY@SOUPS, USENIX Association, (2016)Clinical applications of image fusion for electrophysiology procedures., , , , , , , , , and 8 other author(s). ISBI, page 1435-1438. IEEE, (2012)Validation of a Novel Method for the Automatic Segmentation of Left Atrial Scar from Delayed-Enhancement Magnetic Resonance., , , , , , , , , and 1 other author(s). STACOM, volume 7085 of Lecture Notes in Computer Science, page 254-262. Springer, (2011)TLS Proxies: Friend or Foe?, , , and . Internet Measurement Conference, page 551-557. ACM, (2016)Notes from the field: Implementing a security solution for Web Services., and . Inf. Sec. Techn. Report, 10 (1): 25-32 (2005)Image-Based View-Angle Independent Cardiorespiratory Motion Gating for X-ray-Guided Interventional Electrophysiology Procedures., , , , , , , , , and . STACOM, volume 8896 of Lecture Notes in Computer Science, page 158-167. Springer, (2014)Mapping Contact Force during Catheter Ablation for the Treatment of Atrial Fibrillation: New Insights into Ablation Therapy., , , , , , , , , and 1 other author(s). FIMH, volume 6666 of Lecture Notes in Computer Science, page 302-303. Springer, (2011)POSTER: TLS Proxies: Friend or Foe?, , , and . ACM Conference on Computer and Communications Security, page 1487-1489. ACM, (2014)Generation of a cohort of whole-torso cardiac models for assessing the utility of a novel computed shock vector efficiency metric for ICD optimisation., , , , , , , , , and 2 other author(s). Comp. in Bio. and Med., (2019)User Attitudes Toward the Inspection of Encrypted Traffic., , , and . SOUPS, page 131-146. USENIX Association, (2016)