Sciweavers

4163 search results - page 630 / 833
» Enhancing surgical systems
Sort
View
ARITH
2009
IEEE
14 years 5 months ago
Fully Redundant Decimal Arithmetic
Hardware implementation of all the basic radix-10 arithmetic operations is evolving as a new trend in the design and implementation of general purpose digital processors. Redundan...
Saeid Gorgin, Ghassem Jaberipur
CVPR
2009
IEEE
14 years 5 months ago
Automatic fetal face detection from ultrasound volumes via learning 3D and 2D information
3D ultrasound imaging has been increasingly used in clinics for fetal examination. However, manually searching for the optimal view of the fetal face in 3D ultrasound volumes is c...
Shaolei Feng, Shaohua Kevin Zhou, Sara Good, Dorin...
HICSS
2009
IEEE
195views Biometrics» more  HICSS 2009»
14 years 5 months ago
Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites
In recent years, Social Networking Sites (SNSs) have increasingly gained popularity. With the existence of hundreds of such sites, it is not uncommon to have users switching betwe...
Zengyan Cheng, Yinping Yang, John Lim
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
14 years 5 months ago
A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor Networks
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks (WSNs) is energy efficiency. Flooding and SPIN, which are very well-known proactive ...
Moonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunse...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 5 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang