Sciweavers

5435 search results - page 1079 / 1087
» Informed Detection Revisited
Sort
View
TMI
2010
165views more  TMI 2010»
13 years 6 months ago
Spatio-Temporal Data Fusion for 3D+T Image Reconstruction in Cerebral Angiography
—This paper provides a framework for generating high resolution time sequences of 3D images that show the dynamics of cerebral blood flow. These sequences have the potential to ...
Andrew Copeland, Rami Mangoubi, Mukund N. Desai, S...
TON
2010
300views more  TON 2010»
13 years 6 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
ACL
2010
13 years 6 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
AND
2010
13 years 6 months ago
Reshaping automatic speech transcripts for robust high-level spoken document analysis
High-level spoken document analysis is required in many applications seeking access to the semantic content of audio data, such as information retrieval, machine translation or au...
Julien Fayolle, Fabienne Moreau, Christian Raymond...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
« Prev « First page 1079 / 1087 Last » Next »