Sciweavers

2192 search results - page 161 / 439
» Algorithms for Challenging Motif Problems
Sort
View
152
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Information Dissemination Control for Cooperative Active Safety Applications in Vehicular Ad-Hoc Networks
Abstract—Vehicular Ad-Hoc networks (VANETs) play a critical role in enabling important active safety applications such as collision warning and vehicle tracking. The most pressin...
Ching-Ling Huang, Yaser P. Fallah, Raja Sengupta, ...
ICC
2007
IEEE
102views Communications» more  ICC 2007»
15 years 11 months ago
Distributed Scheduling in Input Queued Switches
— Dealing with RTTs (Round Trip Time) in IQ switches has been recently recognized as a challenging problem, especially if considering distributed (multi-chip) scheduler implement...
Alessandra Scicchitano, Andrea Bianco, Paolo Giacc...
CGO
2006
IEEE
15 years 10 months ago
Fast and Effective Orchestration of Compiler Optimizations for Automatic Performance Tuning
Although compile-time optimizations generally improve program performance, degradations caused by individual techniques are to be expected. One promising research direction to ove...
Zhelong Pan, Rudolf Eigenmann
MICCAI
2000
Springer
15 years 8 months ago
Robust Midsagittal Plane Extraction from Coarse, Pathological 3D Images
Abstract. This paper focuses on the evaluation of an ideal midsagittal plane iMSP extraction algorithm. The algorithm was developed for capturing the iMSP from 3D normal and pathol...
Yanxi Liu, Robert T. Collins, William E. Rothfus
ICSAP
2010
15 years 6 months ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...