Sciweavers

988 search results - page 48 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
EWSN
2010
Springer
14 years 6 months ago
Radio Interferometric Angle of Arrival Estimation
Abstract. Several localization algorithms exist for wireless sensor networks that use angle of arrival measurements to estimate node position. However, there are limited options fo...
Isaac Amundson, János Sallai, Xenofon D. Ko...
VMCAI
2004
Springer
14 years 2 months ago
Applying Jlint to Space Exploration Software
Abstract. Java is a very successful programming language which is also becoming widespread in embedded systems, where software correctness is critical. Jlint is a simple but highly...
Cyrille Artho, Klaus Havelund
MPC
2010
Springer
147views Mathematics» more  MPC 2010»
14 years 1 months ago
Designing an Algorithmic Proof of the Two-Squares Theorem
We show a new and constructive proof of the two-squares theorem, based on a somewhat unusual, but very effective, way of rewriting the so-called extended Euclid’s algorithm. Rat...
João F. Ferreira
MICCAI
2010
Springer
13 years 7 months ago
Intra-Patient Supine-Prone Colon Registration in CT Colonography Using Shape Spectrum
CT colonography (CTC) is a minimally invasive screening technique for colorectal polyps and colon cancer. Since electronic colon cleansing (ECC) cannot completely remove the presen...
Zhaoqiang Lai, Jiaxi Hu, Chang Liu, Vahid Taimouri...
ICDE
2007
IEEE
132views Database» more  ICDE 2007»
14 years 10 months ago
Lira: Lightweight, Region-aware Load Shedding in Mobile CQ Systems
Position updates and query re-evaluations are two predominant, costly components of processing location-based, continual queries (CQs) in mobile systems. To obtain high-quality qu...
Bugra Gedik, Ling Liu, Kun-Lung Wu, Philip S. Yu