Sciweavers

1352 search results - page 242 / 271
» Designing Security Requirements Models Through Planning
Sort
View
MICCAI
2000
Springer
14 years 10 days ago
Robust 3D Segmentation of Anatomical Structures with Level Sets
This paper is focused on the use of the level set formalism to segment anatomical structures in 3D images (ultrasound ou magnetic resonance images). A closed 3D surface propagates...
C. Baillard, Christian Barillot
ANTSW
2008
Springer
13 years 10 months ago
A Simulation Study of Routing Performance in Realistic Urban Scenarios for MANETs
Abstract. We study through simulation the performance of two MANET routing algorithms in a realistic urban environment. The two algorithms, AODV and AntHocNet, are representative o...
Gianni Di Caro, Frederick Ducatelle, Luca Maria Ga...
AMT
2010
Springer
302views Multimedia» more  AMT 2010»
13 years 10 months ago
Social Relation Based Search Refinement: Let Your Friends Help You!
One of the major problems for search at Web scale is that the search results on the large scale data might be huge and the users have to browse to find the most relevant ones. Plus...
Xu Ren, Yi Zeng, Yulin Qin, Ning Zhong, Zhisheng H...
ECIR
1998
Springer
13 years 10 months ago
The Relationship between IR and Multimedia Databases
Modern extensible database systems support multimedia data through ADTs. However, because of the problems with multimedia query formulation, this support is not sufficient. Multim...
Arjen P. de Vries, Henk M. Blanken
WSC
1997
13 years 10 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...