Sciweavers

3521 search results - page 636 / 705
» Algorithmic Control in Concurrent Computations
Sort
View
IEEEARES
2010
IEEE
14 years 4 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
3DPVT
2002
IEEE
172views Visualization» more  3DPVT 2002»
14 years 4 months ago
3D objects visualization for remote interactive medical applications
3D medical images produced in health centers represent tremendous amounts of data spread over different places. Automatic processing of these data often allow quantitative and rep...
Johan Montagnat, Eduardo Davila, Isabelle E. Magni...
CIKM
2001
Springer
14 years 3 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
MICCAI
2001
Springer
14 years 3 months ago
Cardiac Motion Analysis from Ultrasound Sequences Using Non-rigid Registration
Abstract. In this article we propose a cardiac motion estimation technique that uses non-rigid registration to compute the dense cardiac displacement field from 2D ultrasound sequ...
María J. Ledesma-Carbayo, Jan Kybic, Manuel...
ICRA
2000
IEEE
117views Robotics» more  ICRA 2000»
14 years 3 months ago
Kinodynamic Motion Planning Amidst Moving Obstacles
This paper presents a randomized motion planner for kinodynamic asteroidavoidanceproblems, in which a robot must avoid collision with moving obstacles under kinematic, dynamic con...
Robert Kindel, David Hsu, Jean-Claude Latombe, Ste...