Sciweavers

796 search results - page 135 / 160
» Spoofing prevention method
Sort
View
DATE
2010
IEEE
118views Hardware» more  DATE 2010»
13 years 8 months ago
Exploiting multiple switch libraries in topology synthesis of on-chip interconnection network
Abstract—On-chip interconnection network is a crucial design component in high-performance System-on-Chips (SoCs). Many of previous works have focused on the automation of its to...
Minje Jun, Sungroh Yoon, Eui-Young Chung
IJBRA
2010
121views more  IJBRA 2010»
13 years 8 months ago
Mining Cytochrome b561 proteins from plant genomes
—Cytochrome b561 (Cyt-b561) proteins play important functions in plants such as anti-toxin defense reactions, growth and development, and prevention of damage to plants from exce...
Stephen O. Opiyo, Etsuko N. Moriyama
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 7 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
SFM
2011
Springer
253views Formal Methods» more  SFM 2011»
13 years 20 days ago
Application-Layer Connector Synthesis
The heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to coo...
Paola Inverardi, Romina Spalazzese, Massimo Tivoli

Publication
151views
12 years 8 months ago
Embedding Overlap Priors in Variational Left Ventricle Tracking
Tracking heart motion plays an essential role in the diagnosis of cardiovascular diseases. This study investigates overlap priors for variational tracking of the Left Ventricle (LV...
Ismail Ben Ayed, Shuo Li and Ian Ross