Sciweavers

24529 search results - page 4558 / 4906
» Computing on Authenticated Data
Sort
View
IMC
2010
ACM
15 years 2 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
IMC
2010
ACM
15 years 2 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
MICCAI
2010
Springer
15 years 2 months ago
Texture Guided Active Appearance Model Propagation for Prostate Segmentation
Fusion of Magnetic Resonance Imaging (MRI) and Trans Rectal Ultra Sound (TRUS) images during TRUS guided prostate biopsy improves localization of the malignant tissues. Segmented p...
Soumya Ghose, Arnau Oliver, Robert Marti, Xavier L...
MICCAI
2010
Springer
15 years 2 months ago
Optimized Anisotropic Rotational Invariant Diffusion Scheme on Cone-Beam CT
Cone-beam computed tomography (CBCT) is an important image modality for dental surgery planning, with high resolution images at a relative low radiation dose. In these scans the ma...
Dirk-Jan Kroon, Cornelis H. Slump, Thomas J. J. Ma...
QEST
2010
IEEE
15 years 2 months ago
Symblicit Calculation of Long-Run Averages for Concurrent Probabilistic Systems
Abstract--Model checkers for concurrent probabilistic systems have become very popular within the last decade. The study of long-run average behavior has however received only scan...
Ralf Wimmer, Bettina Braitling, Bernd Becker, Erns...
« Prev « First page 4558 / 4906 Last » Next »