Sciweavers

1083 search results - page 188 / 217
» Location, location, location!: modeling data proximity in th...
Sort
View
TMI
2010
128views more  TMI 2010»
14 years 10 months ago
Segmentation of the Outer Vessel Wall of the Common Carotid Artery in CTA
—A novel method is presented for carotid artery vessel wall segmentation in computed tomography angiography (CTA) data. First the carotid lumen is semi-automatically segmented us...
Danijela Vukadinovic, Theo van Walsum, Rashindra M...
ICIP
2010
IEEE
14 years 9 months ago
Detecting pitching frames in baseball game video using Markov random walk
Pitching is the starting point of an event in baseball games. Hence, locating pitching shots is a critical step in content analysis of a baseball game video. However, pitching fra...
Chih-Yi Chiu, Po-Chih Lin, Wei-Ming Chang, Hsin-Mi...
TMC
2011
164views more  TMC 2011»
14 years 6 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
ICASSP
2011
IEEE
14 years 3 months ago
Basis pursuit for spectrum cartography
A nonparametric version of the basis pursuit method is developed for field estimation. The underlying model entails known bases, weighted by generic functions to be estimated fro...
Juan Andrés Bazerque, Gonzalo Mateos, Georg...
INFOCOM
2011
IEEE
14 years 3 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao