Sciweavers

12637 search results - page 2521 / 2528
» Security for Extensible Systems
Sort
View
JDCTA
2010
347views more  JDCTA 2010»
13 years 2 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
MASS
2010
161views Communications» more  MASS 2010»
13 years 2 months ago
Mode switch - Adaptive use of delay-sensitive or energy-aware communication in IEEE 802.15.4-based networks
Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
Feng Chen, Xiaoyu Tong, Edith Ngar, Falko Dressler
TMI
2010
208views more  TMI 2010»
13 years 2 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
TON
2010
167views more  TON 2010»
13 years 2 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
BMCBI
2011
13 years 2 months ago
Analysis on the reconstruction accuracy of the Fitch method for inferring ancestral states
Background: As one of the most widely used parsimony methods for ancestral reconstruction, the Fitch method minimizes the total number of hypothetical substitutions along all bran...
Jialiang Yang, Jun Li, Liuhuan Dong, Stefan Gr&uum...
« Prev « First page 2521 / 2528 Last » Next »