Sciweavers

24529 search results - page 4495 / 4906
» Computing on Authenticated Data
Sort
View
BILDMED
2009
173views Algorithms» more  BILDMED 2009»
15 years 6 months ago
Interactive Boundary Detection for Automatic Definition of 2D Opacity Transfer Function
In computer assisted diagnostics nowadays, high-value 3-D visualization intake a supporting role to the traditional 2-D slice wise visualization. 3-D visualization may create intui...
Martin Rauberger, Heinrich M. Overhoff
132
Voted
ATAL
2010
Springer
15 years 6 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
AVI
2010
15 years 6 months ago
An architecture and a visual interface for tagging the 3D web
Content classification performed by end users is spreading through the web. Most of the work done so far is related to the hypermedia web. In spite of that, there is a growing mas...
Fabio Pittarello
DAWAK
2010
Springer
15 years 6 months ago
Using Transitivity to Increase the Accuracy of Sample-Based Pearson Correlation Coefficients
Abstract. Pearson product-moment correlation coefficients are a wellpracticed quantification of linear dependence seen across many fields. When calculating a sample-based correlati...
Taylor Phillips, Chris GauthierDickey, Ramki Thuri...
CIIA
2009
15 years 6 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
« Prev « First page 4495 / 4906 Last » Next »