Sciweavers

207 search results - page 21 / 42
» A Computational Mechanism for Pronominal Reference
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ISBI
2011
IEEE
13 years 1 months ago
Skull-stripping with deformable organisms
Segmenting brain from non-brain tissue within magnetic resonance (MR) images of the human head, also known as skull-stripping, is a critical processing step in the analysis of neu...
Gautam Prasad, Anand A. Joshi, Paul M. Thompson, A...
GI
2009
Springer
13 years 7 months ago
Smart mechatronic driver for surgical trajectory navigation
: The aim of trajectory navigation is to position a surgical instrument along a planned trajectory. Computer assisted navigation systems show maximal flexibility but are limited by...
Matías de la Fuente, Axel Follmann, Sabine ...
WICON
2008
13 years 11 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
IPPS
2010
IEEE
13 years 7 months ago
Use of Peer-To-Peer technology in Internet access networks and its impacts
Abstract--Objectives of the dissertation are impacts of Peerto-Peer (P2P) traffic on Internet core networks as well as novel approaches for using P2P technology in Internet access ...
Peter Danielis, Dirk Timmermann