Sciweavers

471 search results - page 82 / 95
» From Sequential Processes to Grid Computation
Sort
View
ICFEM
2010
Springer
13 years 7 months ago
Dynamic Resource Reallocation between Deployment Components
Abstract. Today’s software systems are becoming increasingly configurable and designed for deployment on a plethora of architectures, ranging from sequential machines via multic...
Einar Broch Johnsen, Olaf Owe, Rudolf Schlatte, Si...
MIR
2004
ACM
154views Multimedia» more  MIR 2004»
14 years 2 months ago
Fast and robust short video clip search using an index structure
In this paper, we present an index structure-based method to fast and robustly search short video clips in large video collections. First we temporally segment a given long video ...
Junsong Yuan, Ling-Yu Duan, Qi Tian, Changsheng Xu
VIS
2004
IEEE
146views Visualization» more  VIS 2004»
14 years 10 months ago
Tracking of Vector Field Singularities in Unstructured 3D Time-Dependent Datasets
In this paper, we present an approach for monitoring the positions of vector field singularities in time-dependent datasets. The concept of singularity index is discussed and exte...
Christoph Garth, Xavier Tricoche, Gerik Scheuerman...
MICCAI
2004
Springer
14 years 9 months ago
Non-rigid Atlas to Subject Registration with Pathologies for Conformal Brain Radiotherapy
Warping a digital atlas toward a patient image allows the simultaneous segmentation of several structures. This may be of great interest for cerebral images, since the brain contai...
Radu Stefanescu, Olivier Commowick, Grégoir...
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham