Sciweavers

3686 search results - page 356 / 738
» Comprehensive comprehensions
Sort
View
MOBIHOC
2008
ACM
16 years 3 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
MOBIHOC
2003
ACM
16 years 3 months ago
Worst-Case optimal and average-case efficient geometric ad-hoc routing
In this paper we present GOAFR, a new geometric ad-hoc routing algorithm combining greedy and face routing. We evaluate this algorithm by both rigorous analysis and comprehensive ...
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
ESOP
2010
Springer
16 years 25 days ago
Automating Security Mediation Placement
Abstract. We present a framework that automatically produces suggestions to resolve type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive s...
Dave King 0002, Divya Muthukumaran, Sanjit A. Sesh...

Publication
384views
16 years 22 days ago
What are Good Apertures for Defocus Deblurring?
In recent years, with camera pixels shrinking in size, images are more likely to include defocused regions. In order to recover scene details from defocused regions, deblurring tec...
Changyin Zhou, Shree Nayar
125
Voted
MICCAI
2009
Springer
16 years 22 days ago
Joint Segmentation of Image Ensembles via Latent Atlases
Abstract. Spatial priors, such as probabilistic atlases, play an important role in MRI segmentation. However, the availability of comprehensive, reliable and suitable manual segmen...
Tammy Riklin Raviv, Koen Van Leemput, William M. W...