Sciweavers

2421 search results - page 203 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
134
Voted
ECCV
2004
Springer
15 years 9 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...
190
Voted
ISER
2004
Springer
300views Robotics» more  ISER 2004»
15 years 9 months ago
Large-Scale Robotic 3-D Mapping of Urban Structures
This article present results for building accurate 3-D maps of urban environments with a mobile Segway RMP. The goal of this project is to use robotic systems to rapidly acquire 3-...
Michael Montemerlo, Sebastian Thrun
118
Voted
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
15 years 5 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
132
Voted
DAC
2005
ACM
16 years 4 months ago
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design
In many of embedded systems, particularly for those with high data computations, the delay of memory access is one of the major bottlenecks in the system's performance. It ha...
Jungeun Kim, Taewhan Kim
141
Voted
AICCSA
2007
IEEE
209views Hardware» more  AICCSA 2007»
15 years 7 months ago
LBS and GIS Technology Combination and Applications
Location Based Services (LBSs) provide personalized services to the subscribers based on their current position using Global Navigation Satellite System (GNSS), Geographic Informa...
Balqies Sadoun, Omar Al-Bayari