Sciweavers

4327 search results - page 822 / 866
» Web presentation system using RST events
Sort
View
AIR
1998
160views more  AIR 1998»
14 years 11 months ago
Automatic Plankton Image Recognition
Plankton form the base of the food chain in the ocean and are fundamental to marine ecosystem dynamics. The rapid mapping of plankton abundance together with taxonomic and size com...
Xiaoou Tang, W. Kenneth Stewart, He Huang, Scott M...
WBIR
2010
SPRINGER
14 years 10 months ago
Model-Based Registration for Motion Compensation during EP Ablation Procedures
Radio-frequency catheter ablation (RFCA) has become an accepted treatment option for atrial fibrillation (Afib). RFCA of Afib involves isolation of the pulmonary veins under X-r...
Alexander Brost, Rui Liao, Joachim Hornegger, Norb...
MST
2011
200views Hardware» more  MST 2011»
14 years 6 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
STACS
2009
Springer
15 years 6 months ago
Strong Completeness of Coalgebraic Modal Logics
ABSTRACT. Canonical models are of central importance in modal logic, in particular as they witness strong completeness and hence compactness. While the canonical model construction...
Lutz Schröder, Dirk Pattinson
DRM
2007
Springer
15 years 6 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen