Skip to main content

Showing 1–3 of 3 results for author: Kunne, S

.
  1. A registration error estimation framework for correlative imaging

    Authors: Guillaume Potier, Frédéric Lavancier, Stephan Kunne, Perrine Paul-Gilloteaux

    Abstract: Correlative imaging workflows are now widely used in bioimaging and aims to image the same sample using at least two different and complementary imaging modalities. Part of the workflow relies on finding the transformation linking a source image to a target image. We are specifically interested in the estimation of registration error in point-based registration. We propose an application of multiv… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 10 pages 2 figures (made of 10 panels in total)

  2. arXiv:2012.00656  [pdf, other

    cs.CV q-bio.TO

    Cross-modal registration using point clouds and graph-matching in the context of correlative microscopies

    Authors: Stephan Kunne, Guillaume Potier, Jean Mérot, Perrine Paul-Gilloteaux

    Abstract: Correlative microscopy aims at combining two or more modalities to gain more information than the one provided by one modality on the same biological structure. Registration is needed at different steps of correlative microscopies workflows. Biologists want to select the image content used for registration not to introduce bias in the correlation of unknown structures. Intensity-based methods migh… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: in Proceedings of iTWIST'20, Paper-ID: 22, Nantes, France, December, 2-4, 2020

    MSC Class: 05C60 ACM Class: I.4; J.3

  3. arXiv:1901.08326  [pdf, other

    cs.NI cs.DC

    A stack-vector routing protocol for automatic tunneling

    Authors: Mohamed Lamine Lamali, Simon Lassourreuille, Stephan Kunne, Johanne Cohen

    Abstract: In a network, a tunnel is a part of a path where a protocol is encapsulated in another one. A tunnel starts with an encapsulation and ends with the corresponding decapsulation. Several tunnels can be nested at some stage, forming a protocol stack. Tunneling is very important nowadays and it is involved in several tasks: IPv4/IPv6 transition, VPNs, security (IPsec, onion routing), etc. However, tun… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

    Journal ref: IEEE INFOCOM 2019, Apr 2019, Paris, France. https://infocom2019.ieee-infocom.org/