Sciweavers

826 search results - page 124 / 166
» Medical Requirements for Data Protection
Sort
View
CSE
2009
IEEE
15 years 4 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
14 years 10 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
ICDE
2001
IEEE
104views Database» more  ICDE 2001»
15 years 11 months ago
Bundles in Captivity: An Application of Superimposed Information
What do you do to make sense of a mass of information on a given topic? Paradoxically, you likely add yet more information to the pile: annotations, underlining, bookmarks, cross-...
Lois M. L. Delcambre, David Maier, Shawn Bowers, M...
BIOSYSTEMS
2007
72views more  BIOSYSTEMS 2007»
14 years 9 months ago
On the use of multi-objective evolutionary algorithms for survival analysis
This paper proposes and evaluates a multi-objective evolutionary algorithm for survival analysis. One aim of survival analysis is the extraction of models from data that approxima...
Christian Setzkorn, Azzam Fouad George Taktak, Ber...
ISVC
2007
Springer
15 years 3 months ago
Interactive Glyph Placement for Tensor Fields
Visualization of glyphs has a long history in medical imaging but gains much more power when the glyphs are properly placed to fill the screen. Glyph packing is often performed vi...
Mario Hlawitschka, Gerik Scheuermann, Bernd Hamann