Sciweavers

34229 search results - page 6565 / 6846
» Power-aware computing systems
Sort
View
WMASH
2004
ACM
15 years 9 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
ACISP
2004
Springer
15 years 9 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
AH
2004
Springer
15 years 9 months ago
PROS: A Personalized Ranking Platform for Web Search
Current search engines rely on centralized page ranking algorithms which compute page rank values as single (global) values for each Web page. Recent work on topic-sensitive PageRa...
Paul-Alexandru Chirita, Daniel Olmedilla, Wolfgang...
ECCV
2004
Springer
15 years 9 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...
143
Voted
ECCV
2004
Springer
15 years 9 months ago
Ultrasound Stimulated Vibro-acoustography
ABSTRACT We describe theoretical principles of an imaging modality that uses the acoustic response of an object to a highly localized dynamic radiation force of an ultrasound field...
James F. Greenleaf, Mostafa Fatemi, Marek Belohlav...
« Prev « First page 6565 / 6846 Last » Next »