The topic of this work are two further developments of the Factorization method for electrical impedance tomography.We present a modification of this method that is capable of detecting mixed inclusions, i.e. both inclusions with a higher as well as inclusions with a lower conductivity than the background medium. In addition, we derive a new method to compute the conductivity inside inclusions after they have been localized.
Dombrowski, B.: Potenziale und Herausforderungen des Geschäftsprozessmanagements im Enterprise 2.0 unter der Berücksichtigung der Dynamik unternehmerischer Systeme. Logos Verlag Berlin, 201 l. Douglas C. Engelbart: SRI-ARG A technical ...
In Bishop, C. M. and Frey, B. J., editors, Ninth International Workshop on Artificial Intelligence and Statistics. Society for Artificial Intelligence and Statistics. Cited on pp. 26 and 28. Silverman, B. W. (1985).
Modellgetriebene Software-Entwicklung, pp. 93–122. ... R. H. Reussner, R. Sinawski, M. Thoma, and M. Willsch, “Modellgetriebene SoftwareEntwicklung - Architekturen, Muster und Eclipse-basierte MDA,” Universität Karlsruhe (TH), Tech.
This book is an outcome of research done by several researchers who have highly contributed to the field of Video Surveillance. The main goal is to present recent advances in this important topic for the Image Processing community.
R. McDougall, J. Mauro, and B. Gregg, “Solaris (TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris (Solaris Series),” 2006. F. Eigler and R. Hat, “Problem solving with systemtap,” in Proceedings of ...
This book is an outcome of research done by several researchers who have highly contributed to the field of Video Surveillance. The main goal is to present recent advances in this important topic for the Image Processing community.
... Sichere Netzwerkkommunikation: Grundlagen, Protokolle und Architekturen. First. Springer Berlin Heidelberg, 2005. R. Bless et al. “A quality-of-service signaling architecture for seamless handover support in next generation, IP-based ...
... Sichere Netzwerkkommunikation. Berlin : Springer, 2005. – ISBN 3-540-21845-9 [14] BONEH, Dan ; FRANKLIN, Matthew: Efficient Generation of Shared RSA Keys. In: Lecture Notes in Computer Science 1294 (1997), S. 425+ [15] BUNDESGERICHTSHOF ...
... Basiswissen Softwarearchitektur: Verstehen, entwerfen, wiederverwenden. Dpunkt Verlag, 1 edition. ation. Artech House Publishers. R Development Core Team (2007). R: A Language and Environment for Statistical Computing. R Foundation for ...
... Bitter Java. Bitter Java. Manning (cit. on pp. 343, 346). Tate, B., M. Clark, and B. Lee (2003). Bitter EJB. Manning Pubs Co Series. Manning (cit. on pp. 41, 343, 346). Thakkar, D., A. E. Hassan, G. Hamann, and P. Flora (2008). “A ...