Sciweavers

11345 search results - page 1853 / 2269
» Foundations of Computer Science
Sort
View
GI
2009
Springer
15 years 2 months ago
AnToNIa: A Software Tool for the Hemodynamic Analysis of Cerebral Vascular Malformations Using 3D and 4D MRA Image Sequences
Abstract: Stroke is the second most common cause of death and major cause of disability worldwide. Approx. 20% of cerebral strokes are caused by hemorrhages due to rupture of cereb...
Nils Daniel Forkert, Dennis Säring, Jens Fieh...
GI
2009
Springer
15 years 2 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
GI
2009
Springer
15 years 2 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
GI
2009
Springer
15 years 2 months ago
Contact Fusion and Multi-Hypotheses Tracking for Low Frequency Active Sonar Data
Abstract: Towed low frequency active sonar systems (LFAS) are used in Anti-Submarine Warfare (ASW) to detect submarines. LFAS systems are hampered by reverberation in shallow water...
Kathrin Seget, Holger Schmaljohann, Arne Schulz
GI
2009
Springer
15 years 2 months ago
Generating Product-based Availability Overviews for Fixed Line Network Access Points
: Product customization has become a commonplace topic in the last few years. Cars can be equipped with numerous gadgets, cell phones come in different colours and so on. In all th...
Christoph Wiesen, Thorsten Wunderlich, Robert Mert...
« Prev « First page 1853 / 2269 Last » Next »