Sciweavers

247 search results - page 12 / 50
» Requirements and Evaluation Procedures for eVoting
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Detection of geometrically known targets in Through-the-Wall radar imaging
We consider the problem of detecting targets behind walls using radar imaging technology. An image-domain based detection technique is proposed that allows to adapt to specific t...
Christian Debes, Abdelhak M. Zoubir, Moeness G. Am...
IACR
2011
212views more  IACR 2011»
13 years 9 months ago
Fully Homomorphic Encryption without Bootstrapping
We present a radically new approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual con...
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanatha...
AIED
2005
Springer
14 years 11 months ago
A Knowledge Acquisition System for Constraint-based Intelligent Tutoring Systems
Building a domain model consumes a major portion of the time and effort required for building an Intelligent Tutoring System. Past attempts at reducing the knowledge acquisition bo...
Pramuditha Suraweera, Antonija Mitrovic, Brent Mar...
TMC
2011
145views more  TMC 2011»
14 years 4 months ago
MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Most previous studies on evaluating MAC protocols are based o...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
IJFIPM
2010
72views more  IJFIPM 2010»
14 years 6 months ago
Non-Rigid Registration for brain MRI: faster and cheaper
: We study the problem of Non-Rigid Registration (NRR) for intra-operative recovery of brain shift during image-guided neurosurgery. Time-critical nature of the tumour resection pr...
Yixun Liu, Andriy Fedorov, Ron Kikinis, Nikos Chri...