Sciweavers

1291 search results - page 139 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ICASSP
2007
IEEE
14 years 23 days ago
Depth Detection of Light Field
We propose an algorithm to detect depths in a light field. Specifically, given a 4D light field, we find all planes at which objects are located. Although the exact depth of each ...
Yi-Hao Kao, Chia-Kai Liang, Li-Wen Chang, Homer H....
ICASSP
2011
IEEE
13 years 19 days ago
Neonatal seizure detection using blind multichannel information fusion
Seizure is the result of excessive electrical discharges of neurons, which usually develops synchronously and happens suddenly in the central nervous system. Clinically, it is dif...
Huaying Li, Aleksandar Jeremic
CBSE
2011
Springer
12 years 8 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale
GPC
2009
Springer
13 years 6 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
MICCAI
2006
Springer
14 years 9 months ago
Reconstruction of Patient-Specific 3D Bone Surface from 2D Calibrated Fluoroscopic Images and Point Distribution Model
Reconstruction of patient-specific 3D bone surface from 2D calibrated fluoroscopic images and a point distribution model is discussed. We present a 2D/3D reconstruction scheme comb...
Guoyan Zheng, Miguel Ángel González ...