Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...
Patients with end stage renal diseases (ESRD) on hemodialysis (HD) have high morbidity and mortality due to multiple causes, one of which is dramatically higher fall rates than th...
Thurmon E. Lockhart, Adam T. Barth, Xiaoyue Zhang,...
Ultrasonography is an invaluable and widely used medical imaging tool.
Nevertheless, automatic texture analysis on ultrasound images remains a challenging
issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...
Catheter tracking has become more and more important in recent interventional applications. It provides real time guidance for the physicians and can be used as motion compensated...
Wen Wu, Terrence Chen, Adrian Barbu, Peng Wang, No...
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...