Sciweavers

1005 search results - page 139 / 201
» Practical Secure Function Evaluation
Sort
View
MEMOCODE
2006
IEEE
14 years 4 months ago
802.11a transmitter: a case study in microarchitectural exploration
Hand-held devices have rigid constraints regarding power dissipation and energy consumption. Whether a new functionality can be supported often depends upon its power requirements...
Nirav Dave, Michael Pellauer, S. Gerding, Arvind
MIAR
2006
IEEE
14 years 4 months ago
List-Mode Affine Rebinning for Respiratory Motion Correction in PET Cardiac Imaging
Positron Emission Tomography (PET) is an established functional imaging modality but its practical deployment is hampered by motion artefacts. This paper proposes a method for corr...
Adrian James Chung, Paolo G. Camici, Guang-Zhong Y...
SAINT
2006
IEEE
14 years 4 months ago
An Application Gateway to Deploy High-quality Video Communications in Various Network Environments
Video communication is being popular by spreading broadband networks. Realization of this kind of communications is important to deploy IPv6. However, many almost of commercial vi...
Takashi Kishida, Kaori Maeda, Eitaro Kohno, Yoshia...
WECWIS
2006
IEEE
107views ECommerce» more  WECWIS 2006»
14 years 4 months ago
Concept Covering for Automated Building Blocks Selection based on Business Processes Semantics
In this paper we present a novel approach and a system for automated selection of building blocks, by exploiting business processes semantics. The selection process is based on a ...
Francesco di Cugno, Tommaso Di Noia, Eugenio Di Sc...
ADMA
2006
Springer
121views Data Mining» more  ADMA 2006»
14 years 4 months ago
A New Polynomial Time Algorithm for Bayesian Network Structure Learning
We propose a new algorithm called SCD for learning the structure of a Bayesian network. The algorithm is a kind of constraintbased algorithm. By taking advantage of variable orderi...
Sanghack Lee, Jihoon Yang, Sungyong Park