Alert button
Picture for Duc Tran

Duc Tran

Alert button

Comparative Validation of Machine Learning Algorithms for Surgical Workflow and Skill Analysis with the HeiChole Benchmark

Add code
Bookmark button
Alert button
Sep 30, 2021
Martin Wagner, Beat-Peter Müller-Stich, Anna Kisilenko, Duc Tran, Patrick Heger, Lars Mündermann, David M Lubotsky, Benjamin Müller, Tornike Davitashvili, Manuela Capek, Annika Reinke, Tong Yu, Armine Vardazaryan, Chinedu Innocent Nwoye, Nicolas Padoy, Xinyang Liu, Eung-Joo Lee, Constantin Disch, Hans Meine, Tong Xia, Fucang Jia, Satoshi Kondo, Wolfgang Reiter, Yueming Jin, Yonghao Long, Meirui Jiang, Qi Dou, Pheng Ann Heng, Isabell Twick, Kadir Kirtac, Enes Hosgor, Jon Lindström Bolmgren, Michael Stenzel, Björn von Siemens, Hannes G. Kenngott, Felix Nickel, Moritz von Frankenberg, Franziska Mathis-Ullrich, Lena Maier-Hein, Stefanie Speidel, Sebastian Bodenstedt

Figure 1 for Comparative Validation of Machine Learning Algorithms for Surgical Workflow and Skill Analysis with the HeiChole Benchmark
Figure 2 for Comparative Validation of Machine Learning Algorithms for Surgical Workflow and Skill Analysis with the HeiChole Benchmark
Figure 3 for Comparative Validation of Machine Learning Algorithms for Surgical Workflow and Skill Analysis with the HeiChole Benchmark
Figure 4 for Comparative Validation of Machine Learning Algorithms for Surgical Workflow and Skill Analysis with the HeiChole Benchmark
Viaarxiv icon

Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems

Add code
Bookmark button
Alert button
Jan 13, 2015
Alexander Hubers, Emily Andrulis, Levi Scott, Tanner Stirrat, Duc Tran, Ruonan Zhang, Ross Sowell, Cindy Grimm, William D. Smart

Figure 1 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 2 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 3 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 4 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Viaarxiv icon