Sciweavers

24529 search results - page 4554 / 4906
» Computing on Authenticated Data
Sort
View
TMI
2010
128views more  TMI 2010»
15 years 3 months ago
Segmentation of the Outer Vessel Wall of the Common Carotid Artery in CTA
—A novel method is presented for carotid artery vessel wall segmentation in computed tomography angiography (CTA) data. First the carotid lumen is semi-automatically segmented us...
Danijela Vukadinovic, Theo van Walsum, Rashindra M...
TPDS
2010
112views more  TPDS 2010»
15 years 3 months ago
Resource Scheduling in Wireless Networks Using Directional Antennas
—Due to a continued increase in the speed and capacities of computing devices, combined with our society’s growing need for mobile communication capabilities, multihop wireless...
Imad Jawhar, Jie Wu, Dharma P. Agrawal
UM
2010
Springer
15 years 3 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
VTC
2010
IEEE
138views Communications» more  VTC 2010»
15 years 3 months ago
Resource Allocation Scheme for Minimizing Uplink Interference in Hierarchical Cellular Networks
—Hierarchical cellular networks (HCNs), in which femtocells are deployed in the coverage of a conventional macrocell, offer a cost effective solution to achieve high user capacit...
Sung-Yeop Pyun, Dong-Ho Cho
CC
2010
Springer
118views System Software» more  CC 2010»
15 years 3 months ago
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values
Abstract. We introduce the concept of future values. Using future values it is possible to represent programs in a new control-flow form such that on any control flow path the data...
Shuhan Ding, Soner Önder
« Prev « First page 4554 / 4906 Last » Next »