Sciweavers

326 search results - page 54 / 66
» Capabilities for Uniqueness and Borrowing
Sort
View
BIBE
2008
IEEE
203views Bioinformatics» more  BIBE 2008»
14 years 2 months ago
A study of the parameters affecting minimum detectable activity concentration level of clinical LSO PET scanners
— Recent studies in the field of molecular imaging have demonstrated the need for PET probes capable of imaging very weak activity distributions. Over this range of applications ...
Nicolas A. Karakatsanis, Konstantina S. Nikita
IAT
2008
IEEE
14 years 2 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
14 years 2 months ago
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model
—We present a novel particle filter implementation for estimating the pose of tags in the environment with respect to an RFID-equipped robot. This particle filter combines sign...
Travis Deyle, Charles C. Kemp, Matthew S. Reynolds
ICDCS
2007
IEEE
14 years 2 months ago
STEP: Sequentiality and Thrashing Detection Based Prefetching to Improve Performance of Networked Storage Servers
State-of-the-art networked storage servers are equipped with increasingly powerful computing capability and large DRAM memory as storage caches. However, their contribution to the...
Shuang Liang, Song Jiang, Xiaodong Zhang
CCS
2007
ACM
14 years 1 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu