Sciweavers

12670 search results - page 2517 / 2534
» Requirements Modeling
Sort
View
CONEXT
2010
ACM
13 years 6 months ago
Is content publishing in BitTorrent altruistic or profit-driven?
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...
GIS
2010
ACM
13 years 6 months ago
Natural neighbor interpolation based grid DEM construction using a GPU
With modern LiDAR technology the amount of topographic data, in the form of massive point clouds, has increased dramatically. One of the most fundamental GIS tasks is to construct...
Alex Beutel, Thomas Mølhave, Pankaj K. Agar...
IPPS
2010
IEEE
13 years 6 months ago
Stability of a localized and greedy routing algorithm
Abstract--In this work, we study the problem of routing packets between undifferentiated sources and sinks in a network modeled by a multigraph. We consider a distributed and local...
Christelle Caillouet, Florian Huc, Nicolas Nisse, ...
ISW
2010
Springer
13 years 6 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
MICCAI
2010
Springer
13 years 6 months ago
ECG-Gated Interventional Cardiac Reconstruction for Non-periodic Motion
The 3-D reconstruction of cardiac vasculature using C-arm CT is an active and challenging field of research. In interventional environments patients often do have arrhythmic heart ...
Christopher Rohkohl, Günter Lauritsch, Lisa B...
« Prev « First page 2517 / 2534 Last » Next »