Sciweavers

748 search results - page 94 / 150
» Applying WinWin to Quality Requirements: A Case Study
Sort
View
CCS
2004
ACM
14 years 2 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
CF
2009
ACM
14 years 3 months ago
Accelerating total variation regularization for matrix-valued images on GPUs
The advent of new matrix-valued magnetic resonance imaging modalities such as Diffusion Tensor Imaging (DTI) requires extensive computational acceleration. Computational accelera...
Maryam Moazeni, Alex A. T. Bui, Majid Sarrafzadeh
SC
2000
ACM
14 years 1 months ago
Real-Time Biomechanical Simulation of Volumetric Brain Deformation for Image Guided Neurosurgery
We aimed to study the performance of a parallel implementation of an intraoperative nonrigid registration algorithm that accurately simulates the biomechanical properties of the b...
Simon K. Warfield, Matthieu Ferrant, Xavier Gallez...
LWA
2008
13 years 10 months ago
Rule-Based Information Extraction for Structured Data Acquisition using TextMarker
Information extraction is concerned with the location of specific items in (unstructured) textual documents, e.g., being applied for the acquisition of structured data. Then, the ...
Martin Atzmüller, Peter Klügl, Frank Pup...
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
14 years 2 months ago
Equilibria in topology control games for ad hoc networks
We study topology control problems in ad hoc networks, where network nodes get to choose their power levels in order to ensure desired connectivity properties. Unlike most other w...
Stephan Eidenbenz, V. S. Anil Kumar, Sibylle Zust