Sciweavers

1050 search results - page 37 / 210
» Two methods of authenticated positioning
Sort
View
KDD
2008
ACM
104views Data Mining» more  KDD 2008»
16 years 5 days ago
Learning methods for lung tumor markerless gating in image-guided radiotherapy
In an idealized gated radiotherapy treatment, radiation is delivered only when the tumor is at the right position. For gated lung cancer radiotherapy, it is difficult to generate ...
Ying Cui, Jennifer G. Dy, Gregory C. Sharp, Brian ...
SIGMOD
2003
ACM
145views Database» more  SIGMOD 2003»
15 years 12 months ago
Containment Join Size Estimation: Models and Methods
Recent years witnessed an increasing interest in researches in XML, partly due to the fact that XML has now become the de facto standard for data interchange over the internet. A ...
Wei Wang 0011, Haifeng Jiang, Hongjun Lu, Jeffrey ...
TSP
2008
178views more  TSP 2008»
14 years 11 months ago
Extended Object Tracking Using Monte Carlo Methods
Abstract-- This paper addresses the problem of tracking extended objects, such as ships or a convoy of vehicles moving in urban environment. Two Monte Carlo techniques for extended...
Donka S. Angelova, Lyudmila Mihaylova
TMC
2012
13 years 2 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
BMCBI
2006
153views more  BMCBI 2006»
14 years 11 months ago
Intensity-based hierarchical Bayes method improves testing for differentially expressed genes in microarray experiments
Background: The small sample sizes often used for microarray experiments result in poor estimates of variance if each gene is considered independently. Yet accurately estimating v...
Maureen A. Sartor, Craig R. Tomlinson, Scott C. We...