Sciweavers

811 search results - page 71 / 163
» Flow Theory: An Enhancement
Sort
View
TMI
2002
386views more  TMI 2002»
13 years 8 months ago
Tracking Leukocytes In Vivo with Shape and Size Constrained Active Contours
Inflammatory disease is initiated by leukocytes (white blood cells) rolling along the inner surface lining of small blood vessels called postcapillary venules. Studying the number ...
Nilanjan Ray, Scott T. Acton, Klaus Ley
TON
2002
76views more  TON 2002»
13 years 8 months ago
Some properties of variable length packet shapers
The min-plus theory of greedy shapers has been developed after Cruz's results on the calculus of network delays. An example of greedy shaper is the buffered leaky bucket cont...
Jean-Yves Le Boudec
ACL
1998
13 years 10 months ago
The Logical Structure of Binding
A log.ical recasting of B.inding Theory is performed as an enhancing step tor the purpose ot its gull and lean declarative implementation. A new insight on sentential anaptioric p...
António Horta Branco
FUIN
1998
122views more  FUIN 1998»
13 years 8 months ago
Finite Markov Chain Results in Evolutionary Computation: A Tour d'Horizon
The theory of evolutionary computation has been enhanced rapidly during the last decade. This survey is the attempt to summarize the results regarding the limit and nite time behav...
Günter Rudolph
CCS
2007
ACM
14 years 3 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu