Sciweavers

5891 search results - page 1153 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 9 months ago
The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems
In this paper, we take an availability-centric view on quality of service (QoS) and propose a model and mechanisms for studying the effectiveness of realistic replication schemes ...
Giwon On, Jens Schmitt, Ralf Steinmetz
JVCIR
2006
127views more  JVCIR 2006»
15 years 4 months ago
Automatic liver segmentation for volume measurement in CT Images
Computed tomography (CT) images have been widely used for diagnosis of liver disease and volume measurement for liver surgery or transplantation. Automatic liver segmentation and ...
Seong-Jae Lim, Yong-Yeon Jeong, Yo-Sung Ho
TWC
2008
105views more  TWC 2008»
15 years 4 months ago
Receive Antenna Array Strategies in Fading and Interference: An Outage Probability Comparison
We explore tradeoffs between different reception strategies of multiple receive antennas in fading channels with co-channel interference (CCI). Our tradeoff analysis is based on ou...
Juan M. Romero-Jerez, Andrea J. Goldsmith
TMI
1998
137views more  TMI 1998»
15 years 3 months ago
Dynamic Imaging and Tracer Kinetic Modeling for Emission Tomography Using Rotating Detectors
— When performing dynamic studies using emission tomography the tracer distribution changes during acquisition of a single set of projections. This is particularly true for some ...
Chi-Hoi Lau, David Dagan Feng, Brian F. Hutton, Da...
DAC
2000
ACM
16 years 5 months ago
Multiple Si layer ICs: motivation, performance analysis, and design implications
Continuous scaling of VLSI circuits is reducing gate delays but rapidly increasing interconnect delays. Semiconductor Industry Association (SIA) roadmap predicts that, beyond the ...
Shukri J. Souri, Kaustav Banerjee, Amit Mehrotra, ...
« Prev « First page 1153 / 1179 Last » Next »