Sciweavers

8315 search results - page 1656 / 1663
» Performance Evaluation for Global Computation
Sort
View
MEDIAFORENSICS
2010
14 years 8 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
MICCAI
2010
Springer
14 years 8 months ago
Complete Valvular Heart Apparatus Model from 4D Cardiac CT
Abstract. The cardiac valvular apparatus, composed of the aortic, mitral, pulmonary and tricuspid valve, is an essential part of the anatomical, functional and hemodynamic characte...
Sasa Grbic, Razvan Ioan Ionasec, Dime Vitanovski, ...
SIGOPS
2010
162views more  SIGOPS 2010»
14 years 8 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
93
Voted
WINET
2010
153views more  WINET 2010»
14 years 8 months ago
Data aggregation in sensor networks using learning automata
One way to reduce energy consumption in wireless sensor networks is to reduce the number of packets being transmitted in the network. As sensor networks are usually deployed with a...
Mehdi Esnaashari, Mohammad Reza Meybodi
IMC
2010
ACM
14 years 7 months ago
The impact of YouTube recommendation system on video views
Hosting a collection of millions of videos, YouTube offers several features to help users discover the videos of their interest. For example, YouTube provides video search, relate...
Renjie Zhou, Samamon Khemmarat, Lixin Gao
« Prev « First page 1656 / 1663 Last » Next »