نتایج جستجو برای: 0140

تعداد نتایج: 177  

2012
Austin Reiter Peter K. Allen Tao Zhao

Purpose We propose a system capable of detecting articulated surgical instruments without the use of assistive markers or manual initialization. Methods The algorithm can provide 3D pose using a combination of online and offline learning techniques along with prior geometric knowledge of the tool. It uses live kinematic data from the robotic system to render nearby poses on-thefly as virtual im...

Journal: :Computer Communications 2009
Chao Song Ming Liu Jiannong Cao Yuan Zheng Hai-gang Gong Guihai Chen

0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.02.002 * Corresponding author. Tel.: +86 28 83202446/876 E-mail address: [email protected] (C. Song). In a wireless sensor network (WSN), the unbalanced distribution of communication loads often causes the problem of energy hole, which means the energy of the nodes in the hole region will be exhausted sooner than the nod...

Journal: :Computer Communications 2011
Ying-Dar Lin Shun-Lee Chang Shi-Hung Tao Jui-Hung Yeh

0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.11.011 ⇑ Corresponding author at: Department of Comp Tung University, Taiwan. Tel.: +886 3 571 2121x5666 E-mail address: [email protected] (S.-L. Chan 1 As described in [3–5], researchers typically classify architectures according to node mobility. This pape common architecture, Infrastructure/Backbone WMN [ Broadc...

Journal: :Annals of agricultural and environmental medicine : AAEM 2014
Katarzyna Śliżewska Małgorzata Piotrowska

Mycotoxins present in fodders may evoke health problems of animals and people. The data published by FAO in 2001 show that 25% of raw materials are contaminated with mycotoxins, while their type and concentration are to a great extent dependable on the climatic zone. Biological detoxification of mycotoxins by the use of microorganisms is one of the well-known strategies for the management of my...

Journal: :Computer Communications 2012
Chongyang Xie Hamad Alazemi Nasir Ghani

0140-3664/$ see front matter 2012 Elsevier B.V. A http://dx.doi.org/10.1016/j.comcom.2012.02.011 ⇑ Corresponding author. Tel.: +1 505 277 2436; fax E-mail addresses: [email protected] (C. Xie), hamed@en [email protected], [email protected] (N. Ghani). The advance reservation of network connections is an area of growing interest and a range of service models and algorithms have been proposed to achieve...

Journal: :Computer Communications 2010
Ying Zhang Lu Peng Wencheng Lu Lide Duan Suresh Rai

0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.10.006 * Corresponding author. E-mail addresses: [email protected] (Y. Zhang) [email protected] (W. Lu), [email protected] (L. Duan), s In this paper, we propose a novel supernode caching scheme to reduce IP lookup latencies and energy consumption in network processors. In stead of using an expensive TCAM based scheme, we imp...

Journal: :JOEUC 2010
Netta Iivari

This paper analyzes how organizational culture is intertwined with usability work in software (SW) development organizations. Usability is an important quality characteristic of software products and systems. However, the development of usability is challenging in SW development. Organizational culture has been argued to affect usability work in SW development organizations, thus, this paper ta...

Journal: :Journal of biomedical informatics 2002
Hong Yu Vasileios Hatzivassiloglou Andrey Rzhetsky W. John Wilbur

MOTIVATION Natural language processing (NLP) techniques are used to extract information automatically from computer-readable literature. In biology, the identification of terms corresponding to biological substances (e.g., genes and proteins) is a necessary step that precedes the application of other NLP systems that extract biological information (e.g., protein-protein interactions, gene regul...

Journal: :Computer Communications 2010
Thao P. Nghiem Tae Ho Cho

0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.03.006 * Corresponding author. Tel.: +82 31 290 7221; fax E-mail addresses: [email protected] (T.P. Ng (T.H. Cho). A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved hop-by-hop authentication (IHA) scheme has be...

Journal: :Computer Communications 2010
Óscar Trullols-Cruces Marco Fiore Claudio Casetti Carla-Fabiana Chiasserini José M. Barceló-Ordinas

0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.11.021 * Corresponding author. E-mail addresses: [email protected] (O. Trullols), Fiore), [email protected] (C. Casetti), chiasserini@t [email protected] (J.M. Barcelo Ordinas). We consider an intelligent transportation system where a given number of infrastructured nodes (called Dissemination Points, DPs) have to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید