Sciweavers

271 search results - page 25 / 55
» Multi-target Detection by Multi-sensor Systems: A Comparison...
Sort
View
78
Voted
BIOSTEC
2008
137views Healthcare» more  BIOSTEC 2008»
14 years 10 months ago
Breast Contour Detection with Stable Paths
Abstract. Breast cancer conservative treatment (BCCT), due to its proven oncological safety, is considered, when feasible, the gold standard of breast cancer treatment. However, ae...
Jaime S. Cardoso, Ricardo Sousa, Luís Filip...
TWC
2008
105views more  TWC 2008»
14 years 9 months ago
On Multi-User EXIT Chart Analysis Aided Turbo-Detected MBER Beamformer Designs
This paper studies the mutual information transfer characteristics of a novel iterative soft interference cancellation (SIC) aided beamforming receiver communicating over both addi...
Shuang Tan, Sheng Chen, Lajos Hanzo
80
Voted
APSCC
2006
IEEE
14 years 11 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
TIFS
2008
109views more  TIFS 2008»
14 years 9 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...
ICSM
2009
IEEE
15 years 4 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy