Sciweavers

199 search results - page 38 / 40
» Evaluation of the Information-Theoretic Construction of Mult...
Sort
View
BILDMED
2009
128views Algorithms» more  BILDMED 2009»
13 years 8 months ago
Surface-Based Respiratory Motion Classification and Verification
To ensure precise tumor irradiation in radiotherapy a stable breathing pattern is mandatory as tumors are moving due to respiratory motion. Consequentially, irregularities of respi...
Kerstin Müller, Christian Schaller, Jochen Pe...
SOSP
2003
ACM
14 years 4 months ago
Bullet: high bandwidth data dissemination using an overlay mesh
In recent years, overlay networks have become an effective alternative to IP multicast for efficient point to multipoint communication across the Internet. Typically, nodes self-...
Dejan Kostic, Adolfo Rodriguez, Jeannie R. Albrech...
USS
2008
13 years 9 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
BMCBI
2008
156views more  BMCBI 2008»
13 years 7 months ago
The unique probe selector: a comprehensive web service for probe design and oligonucleotide arrays
Background: Nucleic acid hybridization, a fundamental technique in molecular biology, can be modified into very effective and sensitive methods for detecting particular targets mi...
Shu-Hwa Chen, Chen-Zen Lo, Ming-Chi Tsai, Chao A. ...
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu