Sciweavers

948 search results - page 115 / 190
» The similarity metric
Sort
View
ISBI
2008
IEEE
16 years 16 days ago
Application of a spatially variant system model for 3-D whole-body pet image reconstruction
Accurate system modeling in tomographic image reconstruction has been shown to reduce the spatial variance of resolution and improve quantitative accuracy. System modeling can be ...
Adam M. Alessio, Paul E. Kinahan
SUTC
2006
IEEE
15 years 5 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
METRICS
2005
IEEE
15 years 5 months ago
On Refactoring Support Based on Code Clone Dependency Relation
Generally, code clones are regarded as one of the factors that make software maintenance more difficult. A code clone is a set of source code fragments identical or similar to ea...
Norihiro Yoshida, Yoshiki Higo, Toshihiro Kamiya, ...
METRICS
1999
IEEE
15 years 4 months ago
Measuring Coupling and Cohesion: An Information-Theory Approach
The design of software is often depicted by graphs that show components and their relationships. For example, a structure chart shows the calling relationships among components. O...
Edward B. Allen, Taghi M. Khoshgoftaar
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 3 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...