Sciweavers

8479 search results - page 1301 / 1696
» Data Extraction from Web Data Sources
Sort
View
164
Voted
MICCAI
2007
Springer
16 years 5 months ago
Towards Subject-Specific Models of the Dynamic Heart for Image-Guided Mitral Valve Surgery
Abstract. Surgeons need a robust interventional system capable of providing reliable, real-time information regarding the position and orientation of the surgical targets and tools...
Cristian A. Linte, Marcin Wierzbicki, John Moore, ...
ICPR
2008
IEEE
15 years 11 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ICPR
2008
IEEE
15 years 11 months ago
Adaptive context recognition based on audio signal
Auditory data provide many contextual cues about the crucial content of environments around. The goal of audio based context recognition is to equip the sensing devices with class...
Zhi Zeng, Xin Li, Xiaohong Ma, Qiang Ji
CP
2007
Springer
15 years 11 months ago
Exploiting Past and Future: Pruning by Inconsistent Partial State Dominance
It has recently been shown, for the Constraint Satisfaction Problem (CSP), that the state associated with a node of the search tree built by a backtracking algorithm can be exploit...
Christophe Lecoutre, Lakhdar Sais, Sébastie...
LPAR
2007
Springer
15 years 11 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
« Prev « First page 1301 / 1696 Last » Next »