Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Although the scale of isotropic visual elements such as blobs and interest points, e.g. SIFT[12], has been well studied and adopted in various applications, how to determine the s...
Xianming Liu, Changhu Wang, Hongxun Yao, Lei Zhang
Abstract. This paper highlights the shortcomings of current systems of nosocomial infection control and shows how techniques borrowed from statistics and Artificial Intelligence, i...
Timothy Langford, Christophe G. Giraud-Carrier, Jo...
We present an approach to decomposing branching volume data into sub-branches. First, a metric is proposed for evaluating local convexities in volumetric data, and it is a criteri...
We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared communication channel. We redesign randomized protocol of Cai, Lu and ...