Sciweavers

24529 search results - page 210 / 4906
» Computing on Authenticated Data
Sort
View
INFOCOM
2010
IEEE
15 years 1 months ago
On Computing Compression Trees for Data Collection in Wireless Sensor Networks
We address the problem of efficiently gathering correlated data from a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and unders...
Jian Li, Amol Deshpande, Samir Khuller
117
Voted
MICCAI
2008
Springer
16 years 4 months ago
Automatic Detection of Calcified Coronary Plaques in Computed Tomography Data Sets
The detection of calcified plaques is an essential step in the assessment of coronary heart diseases. However, manual plaque segmentation is subjected to intra- and inter-observer ...
Stefan C. Saur, Hatem Alkadhi, Lotus Desbiolles, G...
116
Voted
ISLPED
1997
ACM
99views Hardware» more  ISLPED 1997»
15 years 7 months ago
Low power data processing by elimination of redundant computations
We suggest a new technique to reduce energy consumption in the processor datapath without sacrificing performance by exploiting operand value locality at run time. Data locality is...
Mir Azam, Paul D. Franzon, Wentai Liu
ESA
2011
Springer
252views Algorithms» more  ESA 2011»
14 years 3 months ago
Ray-Shooting Depth: Computing Statistical Data Depth of Point Sets in the Plane
Over the past several decades, many combinatorial measures have been devised for capturing the statistical data depth of a set of n points in R2 . These include Tukey depth [15], O...
Nabil H. Mustafa, Saurabh Ray, Mudassir Shabbir
165
Voted
ICS
1993
Tsinghua U.
15 years 7 months ago
Graph Contraction for Physical Optimization Methods: A Quality-Cost Tradeoff for Mapping Data on Parallel Computers
Mapping data to parallel computers aims at minimizing the execution time of the associated application. However, it can take an unacceptable amount of time in comparison with the ...
Nashat Mansour, Ravi Ponnusamy, Alok N. Choudhary,...