Sciweavers

4636 search results - page 112 / 928
» Modelling and Validation with VipTool
Sort
View
MICCAI
2010
Springer
13 years 6 months ago
A Geometry-Based Particle Filtering Approach to White Matter Tractography
Abstract. We introduce a fibre tractography framework based on a particle filter which estimates a local geometrical model of the underlying white matter tract, formulated as a ...
Peter Savadjiev, Yogesh Rathi, James G. Malcolm, M...
TWC
2010
13 years 2 months ago
Performance of an Energy Detector over Channels with Both Multipath Fading and Shadowing
This paper analyzes the performance of an energy detector over wireless channels with composite multipath fading and shadowing effects. These effects are modeled by using the and ...
Saman Atapattu, Chintha Tellambura, Hai Jiang
CONEXT
2010
ACM
13 years 5 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
PROVSEC
2010
Springer
13 years 5 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
MOR
2002
102views more  MOR 2002»
13 years 7 months ago
Facets of the Complementarity Knapsack Polytope
We present a polyhedral study of the complementarity knapsack problem. Traditionally, complementarity constraints are modeled by introducing auxiliary binary variables and additio...
Ismael R. de Farias Jr., Ellis L. Johnson, George ...