Sciweavers

548 search results - page 91 / 110
» Computation of Shape Through Controlled Active Exploration
Sort
View
ICC
2007
IEEE
154views Communications» more  ICC 2007»
14 years 2 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
CGA
2011
13 years 2 months ago
Visualization at Supercomputing Centers: The Tale of Little Big Iron and the Three Skinny Guys
Supercomputing Centers (SC’s) are unique resources that aim to enable scientific knowledge discovery through the use of large computational resources, the Big Iron. Design, acq...
E. Wes Bethel, John Van Rosendale, Dale Southard, ...
OZCHI
2006
ACM
14 years 1 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
ISW
2010
Springer
13 years 5 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
CVPR
2006
IEEE
14 years 9 months ago
Vessel Crawlers: 3D Physically-based Deformable Organisms for Vasculature Segmentation and Analysis
We present a novel approach to the segmentation and analysis of vasculature from volumetric medical image data. Our method is an adoption and significant extension of deformable o...
Chris McIntosh, Ghassan Hamarneh