Sciweavers

3629 search results - page 684 / 726
» A Network Memory Architecture Model and Performance Analysis
Sort
View
BMCBI
2010
218views more  BMCBI 2010»
13 years 7 months ago
Fast multi-core based multimodal registration of 2D cross-sections and 3D datasets
Background: Solving bioinformatics tasks often requires extensive computational power. Recent trends in processor architecture combine multiple cores into a single chip to improve...
Michael Scharfe, Rainer Pielot, Falk Schreiber
3DIM
2007
IEEE
14 years 2 months ago
Generalized MPU Implicits Using Belief Propagation
In this paper, we present a new algorithm to reconstruct 3D surfaces from an unorganized point cloud based on generalizing the MPU implicit algorithm through introducing a powerfu...
Yi-Ling Chen, Shang-Hong Lai, Tung-Ying Lee
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ESWA
2008
172views more  ESWA 2008»
13 years 7 months ago
DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant
DADICC is the abbreviated name for an intelligent system able to detect on-line and diagnose anomalies as soon as possible in the dynamic evolution of the behaviour of a power pla...
Antonio L. Arranz Matía, Alberto Cruz, Migu...
INFOCOM
2010
IEEE
13 years 6 months ago
Recognizing Exponential Inter-Contact Time in VANETs
—Inter-contact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to ...
Hongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Mi...