Sciweavers

838 search results - page 164 / 168
» Admission control in Peer-to-Peer: design and performance ev...
Sort
View
MICCAI
2006
Springer
14 years 8 months ago
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
Abstract. The quantitative assessment of neck lymph nodes in the context of malign tumors requires an ecient segmentation technique for lymph nodes in tomographic 3D datasets. We p...
Bernhard Preim, Gero Strauß, Heiko Seim, Ilk...
SOUPS
2009
ACM
14 years 2 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
INFOCOM
2008
IEEE
14 years 2 months ago
Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access Networks
—The emerging broadband wireless access (BWA) technology based on IEEE 802.16 is one of the most promising solutions to provide ubiquitous wireless access to the broadband servic...
Eun-Chan Park, Hwangnam Kim, Jae-Young Kim, Han Se...
ATAL
2007
Springer
14 years 1 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee