Sciweavers

1313 search results - page 215 / 263
» Data Discretization Unification
Sort
View
MSWIM
2004
ACM
14 years 2 months ago
Quantile models for the threshold range for k-connectivity
This study addresses the problem of k-connectivity of a wireless multihop network consisting of randomly placed nodes with a common transmission range, by utilizing empirical regr...
Henri Koskinen
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
IMR
2004
Springer
14 years 2 months ago
Reliable Isotropic Tetrahedral Mesh Generation Based on an Advancing Front Method
In this paper, we propose a robust isotropic tetrahedral mesh generation method. An advancing front method is employed to control local mesh density and to easily preserve the ori...
Yasushi Ito, Alan M. Shih, Bharat K. Soni
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 1 months ago
Using the XML-Based Clinical Document Architecture for Exchange of Structured Discharge Summaries
The XML-based Clinical Document Architecture (CDA) for document exchange defines a three-level document architecture with each higher level adding more specificity to the markup o...
Grace I. Paterson, Michael A. Shepherd, Xiaoli Wan...
IPMI
2009
Springer
14 years 1 months ago
Dense Registration with Deformation Priors
Abstract. In this paper we propose a novel approach to define task-driven regularization constraints in deformable image registration using learned deformation priors. Our method ...
Ben Glocker, Nikos Komodakis, Nassir Navab, Georgi...