Sciweavers

9290 search results - page 1676 / 1858
» The Predictability of Data Values
Sort
View
TITB
2008
117views more  TITB 2008»
15 years 3 months ago
Image-Based Gating of Intravascular Ultrasound Pullback Sequences
Intravascularultrasound (IVUS) sequences recorded in vivo are subject to a wide array of motion artifacts as the majority of these studies are performed within the coronary arterie...
Sean M. O'Malley, J. F. Granada, Stephane G. Carli...
JCIT
2007
131views more  JCIT 2007»
15 years 3 months ago
Experiential Motives for Playing Online Games
Online games represent a burgeoning market sector of increasing economic importance. The distinctive entertainment-oriented features of such games provide various experiential val...
Dong-Mo Koo, Soo-Hyung Lee, Heung-Seub Chang
JCM
2007
113views more  JCM 2007»
15 years 3 months ago
Reinventing Healthcare Service through M-care Business Model: The Strategy Analysis of WiMAX Adoption
—To address the emerging issues of aging society, new technology creates many opportunities to solve the problem of care service and increases added-value in the digital family. ...
Paul T. Y. Tseng, Huei-Huang Chen
125
Voted
TON
2008
86views more  TON 2008»
15 years 3 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
TSE
2008
91views more  TSE 2008»
15 years 3 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
« Prev « First page 1676 / 1858 Last » Next »