Sciweavers

28095 search results - page 5570 / 5619
» D
Sort
View
157
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 11 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
152
Voted
TIT
2010
156views Education» more  TIT 2010»
14 years 11 months ago
Bandwidth and power allocation for cooperative strategies in Gaussian relay networks
Abstract-- In a relay network with a single sourcedestination pair, we examine the achievable rates with amplifyand-forward (AF) relaying strategy. Motivated by applications in sen...
Ivana Maric, Roy D. Yates
144
Voted
TITB
2010
163views Education» more  TITB 2010»
14 years 11 months ago
Absolute electrical impedance tomography (aEIT) guided ventilation therapy in critical care patients: simulations and future tre
Thoracic electrical impedance tomography (EIT) is a noninvasive, radiation-free monitoring technique whose aim is to reconstruct a cross-sectional image of the internal spatial dis...
Mouloud Azzedine Denaï, Mahdi Mahfouf, Suzani...
159
Voted
TITB
2010
128views Education» more  TITB 2010»
14 years 11 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
124
Voted
TOG
2010
89views more  TOG 2010»
14 years 11 months ago
Volumetric modeling with diffusion surfaces
The modeling of volumetric objects is still a difficult problem. Solid texture synthesis methods enable the design of volumes with homogeneous textures, but global features such a...
Kenshi Takayama, Olga Sorkine, Andrew Nealen, Take...
« Prev « First page 5570 / 5619 Last » Next »