Sciweavers

497 search results - page 52 / 100
» Symmetry within and between solutions
Sort
View

Publication
151views
14 years 29 days ago
Embedding Overlap Priors in Variational Left Ventricle Tracking
Tracking heart motion plays an essential role in the diagnosis of cardiovascular diseases. This study investigates overlap priors for variational tracking of the Left Ventricle (LV...
Ismail Ben Ayed, Shuo Li and Ian Ross
LCTRTS
2009
Springer
15 years 8 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
ISORC
2009
IEEE
15 years 8 months ago
Embedded JIT Compilation with CACAO on YARI
Java is one of the most popular programming languages for the development of portable workstation and server applications available today. Because of its clean design and typesafe...
Florian Brandner, Tommy Thorn, Martin Schoeberl
COMSWARE
2007
IEEE
15 years 6 months ago
On Configuring BGP Route Reflectors
The Border Gateway Protocol (BGP) is the standard protocol for exchanging routing information between border routers of Autonomous Systems (ASes) in today's Internet. Within a...
Yuri Breitbart, Minos N. Garofalakis, Anupam Gupta...
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 5 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan