Sciweavers

SAC
2006
ACM
13 years 10 months ago
Hardware/software 2D-3D backprojection on a SoPC platform
The reduction of image reconstruction time is needed to spread the use of PET for research and routine clinical practice. In this purpose, this article presents a hardware/softwar...
Nicolas Gac, Stéphane Mancini, Michel Desvi...
SAC
2006
ACM
13 years 10 months ago
Digital geometry image analysis for medical diagnosis
This paper describes a new medical image analysis technique for polygon mesh surfaces of human faces for a medical diagnosis application. The goal is to explore the natural patter...
Jiandong Fang, Shiaofen Fang, Jeffrey Huang, Mihra...
SAC
2006
ACM
13 years 10 months ago
KALA: Kernel Aspect language for advanced transactions
Transaction management is a known crosscutting concern. Previous research has been conducted to express this concern as an aspect. However, such work has used general-purpose aspe...
Johan Fabry, Theo D'Hondt
SAC
2006
ACM
13 years 10 months ago
Combining speech and pen input for effective interaction in mobile geospatial environments
Relatively little research has been conducted into designing interfaces that allow GIS users to interact effectively with geospatial data in mobile environments. Users on the mov...
Julie Doyle, Michela Bertolotto
SAC
2006
ACM
13 years 10 months ago
Ontology-based integration for relational databases
In this paper, we show that representation and reasoning techniques used in traditional knowledge engineering and the emerging Semantic Web can play an important role for heteroge...
Dejing Dou, Paea LePendu
SAC
2006
ACM
13 years 10 months ago
A probability analysis for candidate-based frequent itemset algorithms
This paper explores the generation of candidates, which is an important step in frequent itemset mining algorithms, from a theoretical point of view. Important notions in our prob...
Nele Dexters, Paul W. Purdom, Dirk Van Gucht
SAC
2006
ACM
13 years 10 months ago
Branchless cycle prediction for embedded processors
Modern embedded processors access the Branch Target Buffer (BTB) every cycle to speculate branch target addresses. Such accesses, quite often, are unnecessary as there is no branc...
Kaveh Jokar Deris, Amirali Baniasadi
SAC
2006
ACM
13 years 10 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
SAC
2006
ACM
13 years 10 months ago
Protein classification using transductive learning on phylogenetic profiles
Phylogenetic profiles of proteins − strings of ones and zeros encoding respectively the presence and absence of proteins in a group of genomes − have recently been used to iden...
Roger A. Craig, Li Liao
SAC
2006
ACM
13 years 10 months ago
Operating system multilevel load balancing
This paper describes an algorithm that allows Linux to perform multilevel load balancing in NUMA computers. The Linux scheduler implements a load balancing algorithm that uses str...
Mônica Corrêa, Avelino Francisco Zorzo...