Sciweavers

42230 search results - page 8431 / 8446
» Algorithms and Complexity Results for
Sort
View
TSP
2010
13 years 2 months ago
Improving wireless physical layer security via cooperating relays
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...
WH
2010
208views Healthcare» more  WH 2010»
13 years 2 months ago
Portable, non-invasive fall risk assessment in end stage renal disease patients on hemodialysis
Patients with end stage renal diseases (ESRD) on hemodialysis (HD) have high morbidity and mortality due to multiple causes, one of which is dramatically higher fall rates than th...
Thurmon E. Lockhart, Adam T. Barth, Xiaoyue Zhang,...

Publication
352views
13 years 23 days ago
A Contourlet Transform Feature Extraction Scheme for Ultrasound Thyroid Texture Classification
Ultrasonography is an invaluable and widely used medical imaging tool. Nevertheless, automatic texture analysis on ultrasound images remains a challenging issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...
CVPR
2011
IEEE
12 years 11 months ago
Learning-based Hypothesis Fusion for Robust Catheter Tracking in 2D X-ray Fluoroscopy
Catheter tracking has become more and more important in recent interventional applications. It provides real time guidance for the physicians and can be used as motion compensated...
Wen Wu, Terrence Chen, Adrian Barbu, Peng Wang, No...
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
« Prev « First page 8431 / 8446 Last » Next »