Sciweavers

18090 search results - page 3393 / 3618
» Computing by Only Observing
Sort
View
CMIG
2011
168views more  CMIG 2011»
14 years 8 months ago
Comparing axial CT slices in quantized N-dimensional SURF descriptor space to estimate the visible body region
In this paper, a method is described to automatically estimate the visible body region of a computed tomography (CT) volume image. In order to quantify the body region, a body coo...
Johannes Feulner, Shaohua Kevin Zhou, Elli Angelop...
CODASPY
2011
14 years 8 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
CSUR
2011
14 years 8 months ago
Programming wireless sensor networks: Fundamental concepts and state of the art
high-level programming abstractions, capable of simplifying the programming chore without sacrificing efficiency, has been long recognized and several solutions have been hitherto...
Luca Mottola, Gian Pietro Picco
EDBT
2011
ACM
209views Database» more  EDBT 2011»
14 years 8 months ago
An optimal strategy for monitoring top-k queries in streaming windows
Continuous top-k queries, which report a certain number (k) of top preferred objects from data streams, are important for a broad class of real-time applications, ranging from fi...
Di Yang, Avani Shastri, Elke A. Rundensteiner, Mat...
ICDCN
2011
Springer
14 years 8 months ago
Load Balanced Scalable Byzantine Agreement through Quorum Building, with Full Information
We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information model: the ...
Valerie King, Steven Lonargan, Jared Saia, Amitabh...
« Prev « First page 3393 / 3618 Last » Next »