Sciweavers

7821 search results - page 1434 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
112
Voted
CSREASAM
2003
15 years 2 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
110
Voted
TNN
2008
178views more  TNN 2008»
15 years 19 days ago
IMORL: Incremental Multiple-Object Recognition and Localization
This paper proposes an incremental multiple-object recognition and localization (IMORL) method. The objective of IMORL is to adaptively learn multiple interesting objects in an ima...
Haibo He, Sheng Chen
DAGM
2010
Springer
14 years 11 months ago
Catheter Tracking: Filter-Based vs. Learning-Based
Abstract. Atrial fibrillation is the most common sustained arrhythmia. One important treatment option is radio-frequency catheter ablation (RFCA) of the pulmonary veins attached t...
Alexander Brost, Andreas Wimmer, Rui Liao, Joachim...
140
Voted
RAID
2009
Springer
15 years 7 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
DAC
2001
ACM
16 years 1 months ago
Hypermedia-Aided Design
Recently, the Internet revolutionized many activities from entertainment to marketing and business. Two key underlying Internet technologies, efficient data delivery and hypertext...
Darko Kirovski, Milenko Drinic, Miodrag Potkonjak
« Prev « First page 1434 / 1565 Last » Next »