Sciweavers

4330 search results - page 787 / 866
» Analyzing security architectures
Sort
View
ISBI
2011
IEEE
14 years 1 months ago
Segmentation of anatomical branching structures based on texture features and graph cut
Segmentation of tree-like structure within medical imaging modalities, such as x-ray, MRI, ultrasound, etc., is an important step for analyzing branching patterns involved in many...
Tatyana Nuzhnaya, Erkang Cheng, Haibin Ling, Despi...
124
Voted
HPDC
2011
IEEE
14 years 1 months ago
Juggle: proactive load balancing on multicore computers
We investigate proactive dynamic load balancing on multicore systems, in which threads are continually migrated to reduce the impact of processor/thread mismatches to enhance the ...
Steven Hofmeyr, Juan A. Colmenares, Costin Iancu, ...
102
Voted
EI
2011
100views more  EI 2011»
13 years 10 months ago
A time-triggered object tracking subsystem for advanced driver assistance systems
— Multi-sensor object tracking is an important feature for advanced driver assistance systems in future automobiles. Most state-of-the-art systems cannot guarantee deterministic ...
Wilfried Elmenreich, M. Koplin
83
Voted
HICSS
2000
IEEE
131views Biometrics» more  HICSS 2000»
15 years 2 months ago
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
Michael zur Muehlen, Michael Rosemann
95
Voted
INFOCOM
2012
IEEE
13 years 21 days ago
The Bloom paradox: When not to use a Bloom filter?
—In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, it is better to disregard the query results of Bloom filters, and in fact not to even query them, thus...
Ori Rottenstreich, Isaac Keslassy