Sciweavers

7351 search results - page 1351 / 1471
» Segmenting Point Sets
Sort
View
ICASSP
2011
IEEE
13 years 2 months ago
Ordering for energy efficient estimation and optimization in sensor networks
A discretized version of a continuous optimization problem is considered for the case where data is obtained from a set of dispersed sensor nodes and the overall metric is a sum o...
Rick S. Blum
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 1 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
DIMVA
2011
13 years 1 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
FIMH
2011
Springer
13 years 1 months ago
Construction of Left Ventricle 3D Shape Atlas from Cardiac MRI
In this paper, we present an effective algorithm to construct a 3D shape atlas for the left ventricle of heart from cardiac Magnetic Resonance Image data. We derive a framework tha...
Shaoting Zhang, Mustafa Gökhan Uzunbas, Zhenn...
ICDT
2011
ACM
213views Database» more  ICDT 2011»
13 years 1 months ago
On provenance and privacy
Provenance in scientific workflows is a double-edged sword. On the one hand, recording information about the module executions used to produce a data item, as well as the parame...
Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Ju...
« Prev « First page 1351 / 1471 Last » Next »