Sciweavers

2230 search results - page 395 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
TMI
2010
201views more  TMI 2010»
14 years 8 months ago
Automated and Interactive Lesion Detection and Segmentation in Uterine Cervix Images
—This paper presents a procedure for automatic extraction and segmentation of a class-specific object (or region) by learning class-specific boundaries. We describe and evaluat...
Amir Alush, Hayit Greenspan, Jacob Goldberger
TMC
2011
164views more  TMC 2011»
14 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
LCTRTS
2007
Springer
15 years 3 months ago
Generalizing parametric timing analysis
In the design of real-time and embedded systems, it is important to establish a bound on the worst-case execution time (WCET) of programs to assure via schedulability analysis tha...
Joel Coffman, Christopher A. Healy, Frank Mueller,...
97
Voted
CORR
2008
Springer
142views Education» more  CORR 2008»
14 years 9 months ago
On the Capacity and Diversity-Multiplexing Tradeoff of the Two-Way Relay Channel
This paper considers a multiple input multiple output (MIMO) two-way relay channel, where two nodes want to exchange data with each other using multiple relays. An iterative algor...
Rahul Vaze, Robert W. Heath Jr.
85
Voted
CODES
2008
IEEE
15 years 4 months ago
Distributed flit-buffer flow control for networks-on-chip
The combination of flit-buffer flow control methods and latency-insensitive protocols is an effective solution for networks-on-chip (NoC). Since they both rely on backpressure...
Nicola Concer, Michele Petracca, Luca P. Carloni