Sciweavers

5948 search results - page 1053 / 1190
» Computing Robust Counter-Strategies
Sort
View
CARS
2001
15 years 4 months ago
Determination of optimal angiographic viewing angles for QCA
Important parameters in quantitative coronary angiography (QCA) are the severity and length of the lesion, the radius of the nonstenotic part of the affected vessel segment and th...
J. Christiaens, Rik Van de Walle, P. Gheeraert, Y....
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 4 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
161
Voted
DICTA
2003
15 years 4 months ago
3D Face Recognition Using Longitudinal Section and Transection
In this paper, a new practical implementation of a person verification system using features of longitudinal section and transection and other facial, rotation compensated 3D face ...
Yeung-hak Lee
113
Voted
IAAI
2001
15 years 4 months ago
Token Allocation Strategy for Free-Flight Conflict Solving
For the last 10 years, airlines have widely supported research on the development of airspaces where aircraft would be free to decide their trajectory: these areas where called Fr...
Géraud Granger, Nicolas Durand, Jean-Marc A...
133
Voted
JVM
2001
99views Education» more  JVM 2001»
15 years 4 months ago
JVM Susceptibility to Memory Errors
Modern computer systems are becoming more powerful and are using larger memories. However, except for very high end systems, little attention is being paid to high availability. T...
DeQing Chen, Alan Messer, Philippe Bernadat, Guang...
« Prev « First page 1053 / 1190 Last » Next »