Sciweavers

995 search results - page 105 / 199
» complexity 2011
Sort
View
136
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
149
Voted
ICDE
2011
IEEE
220views Database» more  ICDE 2011»
14 years 7 months ago
Generating test data for killing SQL mutants: A constraint-based approach
—Complex SQL queries are widely used today, but it is rather difficult to check if a complex query has been written correctly. Formal verification based on comparing a specifi...
Shetal Shah, S. Sudarshan, Suhas Kajbaje, Sandeep ...
155
Voted
ISBI
2011
IEEE
14 years 7 months ago
Sparse topological data recovery in medical images
For medical image analysis, the test statistic of the measurements is usually constructed at every voxels in space and thresholded to determine the regions of significant signals...
Moo K. Chung, Hyekyoung Lee, Peter T. Kim, Jong Ch...
198
Voted
ISBI
2011
IEEE
14 years 7 months ago
3D segmentation of rodent brain structures using Active Volume Model with shape priors
Object boundary extraction is an important task in brain image analysis. Acquiring detailed 3D representations of the brain structures could improve the detection rate of diseases...
Shaoting Zhang, Junzhou Huang, Mustafa Gökhan...
150
Voted
ISCA
2011
IEEE
271views Hardware» more  ISCA 2011»
14 years 7 months ago
CRIB: consolidated rename, issue, and bypass
Conventional high-performance processors utilize register renaming and complex broadcast-based scheduling logic to steer instructions into a small number of heavily-pipelined exec...
Erika Gunadi, Mikko H. Lipasti