Multiple behavior information fusion based quantitative threat evaluation Fulltext Access 14 Pages 2005
4D deformable models with temporal constraints: application to 4D cardiac image segmentation Fulltext Access 14 Pages 2005
Confhusius: A robust and fully automatic calibration method for 3D freehand ultrasound Fulltext Access 14 Pages 2005
Simulation of cardiac pathologies using an electromechanical biventricular model and XMR interventional imaging Fulltext Access 14 Pages 2005
White matter tractography by anisotropic wavefront evolution and diffusion tensor imaging Fulltext Access 14 Pages 2005
Scale-invariant registration of monocular endoscopic images to CT-scans for sinus surgery Fulltext Access 14 Pages 2005
Towards a model of lung biomechanics: pulmonary kinematics via registration of serial lung images Fulltext Access 14 Pages 2005
Fast and low-cost search schemes by exploiting localities in P2P networks Fulltext Access 14 Pages 2005
Experiences with optimizing two stream-based applications for cluster execution Fulltext Access 14 Pages 2005
PYR: a Cellular Automata model for pyroclastic flows and application to the 1991 Mt. Pinatubo eruption Fulltext Access 14 Pages 2005
Monitoring cache behavior on parallel SMP architectures and related programming tools Fulltext Access 14 Pages 2005
A super-peer model for resource discovery services in large-scale Grids Fulltext Access 14 Pages 2005
ECEM: an event correlation based event manager for an I/O-intensive application Fulltext Access 14 Pages 2005
Performance analysis of software reliability growth models with testing-effort and change-point Fulltext Access 14 Pages 2005
An agent based adaptive bandwidth allocation scheme for multimedia applications Fulltext Access 14 Pages 2005
Distribution of digital contents based on public key considering execution speed and security Fulltext Access 14 Pages 2005
Two controlled experiments concerning the comparison of pair programming to peer review Fulltext Access 14 Pages 2005
Instruction level redundant number computations for fast data intensive processing in asynchronous processors Fulltext Access 14 Pages 2005
Methodologies for the use of VMware to boot cloned/mounted subject hard disk images Fulltext Access 14 Pages 2005
A finite element formulation for transient incompressible viscous flows stabilized by local time-steps Fulltext Access 14 Pages 2005
On a 50% savings in the computation of the centroid of a symmetrical interval type-2 fuzzy set Fulltext Access 14 Pages 2005
Distributed object transportation on a desired path based on Constrain and Move strategy Fulltext Access 14 Pages 2005
Distance-aware L2 cache organizations for scalable multiprocessor systems Fulltext Access 14 Pages 2005
The impact of free and open source licensing on operating system software markets Fulltext Access 14 Pages 2005
Entity identification for heterogeneous database integration-a multiple classifier system approach and empirical evaluation Fulltext Access 14 Pages 2005
New technologies for testing a model of cricket phonotaxis on an outdoor robot Fulltext Access 14 Pages 2005
A virtual centrifugal force based navigation algorithm for explorative robotic tasks in unknown environments Fulltext Access 14 Pages 2005
Modelling an arm's spatially correlated biases: an application to camera calibration for teleoperation Fulltext Access 14 Pages 2005
Correlating driver gaze with the road scene for driver assistance systems Fulltext Access 14 Pages 2005
A software framework to integrate vision and reasoning components for Cognitive Vision Systems Fulltext Access 14 Pages 2005
Decision making in the TBM: the necessity of the pignistic transformation Fulltext Access 15 Pages 2005
Data mining and machine learning-Towards reducing false positives in intrusion detection Fulltext Access 15 Pages 2005
VoD on steroids : Optimized content delivery using distributed video servers over best-effort Internet Fulltext Access 15 Pages 2005
Compatibility, competition, and control in trusted computing environments Fulltext Access 15 Pages 2005
Can the WSIS declaration principle and plan of action work in Japan? Digital stratification of Japanese society Fulltext Access 15 Pages 2005
Private key infrastructure: balancing computer transmission privacy with changing technology and security demands Fulltext Access 15 Pages 2005
Wireless real-time on-demand data broadcast scheduling with dual deadlines Fulltext Access 15 Pages 2005
Integrating segmentation methods from the Insight Toolkit into a visualization application Fulltext Access 15 Pages 2005
Distributed monitoring and control of office buildings by embedded agents Fulltext Access 15 Pages 2005
Extracting and visualizing physiological parameters using dynamic contrast-enhanced magnetic resonance imaging of the breast Fulltext Access 15 Pages 2005
Evaluating scheduling policies for fine-grain communication protocols on a cluster of SMPs Fulltext Access 15 Pages 2005
A quad-tree based algorithm for processor allocation in 2D mesh-connected multicomputers Fulltext Access 15 Pages 2005
Performance analysis of dynamic load balancing algorithms with variable number of processors Fulltext Access 15 Pages 2005
Applying genetic algorithm for the development of the components-based embedded system Fulltext Access 15 Pages 2005