Sciweavers

1192 search results - page 150 / 239
» Computing Weakest Readings
Sort
View
96
Voted
IPPS
2009
IEEE
15 years 10 months ago
Evaluating the use of GPUs in liver image segmentation and HMMER database searches
In this paper we present the results of parallelizing two life sciences applications, Markov random fieldsbased (MRF) liver segmentation and HMMER’s Viterbi algorithm, using GP...
John Paul Walters, Vidyananth Balu, Suryaprakash K...
ICCS
2009
Springer
15 years 10 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
ICDCS
2008
IEEE
15 years 10 months ago
Data Estimation in Sensor Networks Using Physical and Statistical Methodologies
Wireless Sensor Networks (WSNs) are employed in many applications in order to collect data. One key challenge is to minimize energy consumption to prolong network lifetime. A sche...
Yingshu Li, Chunyu Ai, Wiwek P. Deshmukh, Yiwei Wu
144
Voted
ICNSC
2008
IEEE
15 years 10 months ago
A Theoretic Framework for Object Class Tracking
— suppose we have a video, the first half of this video is capturing the images of a sedan and the second half is recording the moving of a truck, can we use the same video track...
Yu Cao, Steve Read, Sachin Raka, Revanth Nandamuri
104
Voted
ICPADS
2008
IEEE
15 years 10 months ago
Integrating Sensor Streams in pHealth Networks
Personal Health (pHealth) sensor networks are generally used to monitor the wellbeing of both athletes and the general public to inform health specialists of future and often seri...
Mark Roantree, Dónall McCann, Niall Moyna