- Medical Imaging Techniques and Applications
- Radiomics and Machine Learning in Medical Imaging
- Advanced X-ray and CT Imaging
- Distributed and Parallel Computing Systems
- Digital Radiography and Breast Imaging
- Orthopaedic implants and arthroplasty
- IPv6, Mobility, Handover, Networks, Security
- Medical Image Segmentation Techniques
- Mobile Agent-Based Network Management
- Interconnection Networks and Systems
- Software-Defined Networks and 5G
- Parallel Computing and Optimization Techniques
- Wireless Networks and Protocols
- Radiation Dose and Imaging
- Distributed systems and fault tolerance
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Advanced Data Storage Technologies
- Total Knee Arthroplasty Outcomes
- Wireless Communication Networks Research
- Medical Imaging and Analysis
- Opportunistic and Delay-Tolerant Networks
- Context-Aware Activity Recognition Systems
- Advanced Radiotherapy Techniques
- Bluetooth and Wireless Communication Technologies
KTH Royal Institute of Technology
2014-2024
Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2017
University of Lisbon
2017
New York University
1985-2010
Sahlgrenska University Hospital
2007
Stockholm South General Hospital
2007
Karolinska Institutet
2007
Kista Photonics Research Center
2002-2006
Karolinska University Hospital
2005
Columbia University
1985-2003
Software radios are emerging as platforms for multiband multimode personal communications systems. Radio etiquette is the set of RF bands, air interfaces, protocols, and spatial temporal patterns that moderate use radio spectrum. Cognitive extends software with radio-domain model-based reasoning about such etiquettes. enhances flexibility services through a knowledge representation language. This language represents etiquette, devices, modules, propagation, networks, user needs, application...
The primary objective of this study is to perform a blinded evaluation group retrospective image registration techniques using as gold standard prospective, marker-based method. To ensure blindedness, all registrations were performed by participants who had no knowledge the results until after their been submitted. A secondary goal project evaluate importance correcting geometrical distortion in MR images comparing error rectified images, i.e., those that have correction applied, with same...
article Free Access Share on IP-based protocols for mobile internetworking Authors: John Ioannidis Department of Computer Science, Columbia University UniversityView Profile , Dan Duchamp Gerald Q. Maguire Authors Info & Claims ACM SIGCOMM Communication ReviewVolume 21Issue 4Sept. 1991 pp 235–245https://doi.org/10.1145/115994.116014Online:01 August 1991Publication History 256citation1,328DownloadsMetricsTotal Citations256Total Downloads1,328Last 12 Months39Last 6 weeks5 Get Citation...
Eighteen consecutive patients, treated with a Taylor Spatial Frame for complex tibia conditions, gave their informed consent to undergo Na(18)F(-) PET/CT bone scans. We present Patlak-like analysis utilizing an approximated blood time-activity curve eliminating the need aliquots. Additionally, standardized uptake values (SUV) derived from dynamic acquisitions were compared this approach. Spherical volumes of interest (VOIs) drawn include broken bone, other (normal) and muscle. The SUV m (t)...
Mobile ad hoc networking allows nodes to form temporary networks and communicate beyond the transmitter range by supporting multihop communication through IP routing. Routing in such is often reactive, i.e., performed on-demand, as opposed Internet routing that proactive. As are formed on a basis, any address should be allowed appear an network. This paper presents MIPMANET, solution for connecting network, which on-demand used, Internet. MIPMANET provides access using mobile with foreign...
All retrospective image registration methods have attached to them some intrinsic estimate of error. However, this accuracy may not always be a good indicator the distance between actual and estimated positions targets within cranial cavity. This paper describes project whose principal goal is use prospective method based on fiducial markers as 'gold standard' perform an objective, blinded evaluation several image-to-image techniques. Image volumes three modalities -- CT, MR, PET were taken...
Mobile ad hoc networking allows nodes to form temporary networks and communicate beyond the transmitter range by supporting multihop communication through IP routing. Routing in such is often reactive, i.e., performed on-demand, as opposed Internet routing that proactive. As are formed on a basis, any address should be allowed appear an network. This paper presents MIPMANET, solution for connecting network, which on-demand used, Internet. MIPMANET provides access using mobile with foreign...
Software that has been developed to automate and standardize comparison of 3D images is discussed. The major approaches image registration are examined. authors' reconstruction software described. Studies carried out determine the relative accuracy present methods reported. main goal authors improve on commercial SPECT algorithms provide quantification sufficient for numerical assessment tracer distribution.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML"...
In modern (Intel) processors, Last Level Cache (LLC) is divided into multiple slices and an undocumented hashing algorithm (aka Complex Addressing) maps different parts of memory address space among these to increase the effective bandwidth. After a careful study Intel's Addressing, we introduce slice-aware management scheme, wherein frequently used data can be accessed faster via LLC. Using our proposed show that key-value store potentially improve its average performance ~12.2% ~11.4% for...
It is difficult to assess the orientation of acetabular component on routine radiographs. We present a method for determining spatial after total hip arthroplasty (THA) using computed tomography.Two CT-scans, 10 min apart, were obtained from each patients THA. Using locally developed software, two independent examiners measured in relation pelvis. The measurements repeated one week. To be patient position during scanning, involved steps. Firstly, 3D volumetric image pelvis was brought into...
This paper describes a novel predictive mobility management algorithm for supporting mobile computing and communications. Traditionally, includes functions to passively keep track of the location users/terminals maintain connections terminals belonging system. To make intelligent mobile-aware applications, it is important that terminal/system be more can anticipate change its user. We propose an aggressive scheme, called management. A motion prediction predicts "future" user according user's...
Abstract: The purpose of this study is to report further about the statistically significant results from a prospective study, which suggests that fusion prone F-18 Fluoro-deoxy-glucose (FDG) positron emission tomography (PET) and magnetic resonance (MR) breast scans increases positive predictive value (PPV) specificity for patients in whom MR outcome alone would be nonspecific. Thirty-six women (mean age, 43 years; range, 24–65 years) with 90 lesions detected on consented undergo FDG-PET...
In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition set theory to determine traffic classes handled chain composed of multiple elements. It then each class using minimal new elements apply single-read-single-write early-discard operations. Our prototype takes baseline state art functions...
We present PacketMill, a system for optimizing software packet processing, which (i) introduces new model to efficiently manage metadata and (ii) employs code-optimization techniques better utilize commodity hardware. PacketMill grinds the whole processing stack, from high-level network function configuration file low-level userspace (specifically DPDK) drivers, mitigate inefficiencies produce customized binary given function. Our evaluation results show that increases throughput (up 36.4...
MRI is a sensitive method for detecting invasive breast cancer, but it lacks specificity. To examine the effect of combining PET with on lesion characterization, prototype positioning device was fabricated to allow scans be acquired in same position as scans—that is, prone. <b>Methods:</b> test hypothesis that fusion <sup>18</sup>F-FDG and improves detection 23 patients suspected recurrent or new cancer underwent routine whole-body scan, prone scan chest, scan. The attenuation-corrected...
Some of the possibilities and requirements for mobile computing on wireless local area networks (LANs) are discussed from systems software viewpoint. The design Student Electronic Notebook (SEN) is sketched to provide a partial catalog problems in building real system computing. This project was initiated investigate potential reshape education. key directions research technology wireless, examined. authors' experience with LANs related.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Cloud computing is expected to provide on-demand, agile, and elastic services. networking extends cloud by providing virtualized functionalities allows various optimizations, for example reduce latency while increasing flexibility in the placement, movement, interconnection of these virtual resources. However, this approach introduces new security challenges. In paper, we propose a intrusion detection model which combine newly proposed genetic based feature selection algorithm an existing...
While the current literature typically focuses on load-balancing among multiple servers, in this paper, we demonstrate importance of within a single machine (potentially with hundreds CPU cores). In context, propose new technique (RSS++) that dynamically modifies receive side scaling (RSS) indirection table to spread load across cores more optimal way. RSS++ incurs up 14x lower 95th percentile tail latency and orders magnitude fewer packet drops compared RSS under high utilization. allows...
We have long used mechanical devices to compensate for physical disability. Soon, however, it may be possible augment mental capacity—to add memory or upgrade processing power. should ponder the enormous moral implications of machine-assisted mind now, before is accomplished.
To enhance the information provided by computed tomography (CT) and single photon emission (SPECT) performed with radiolabeled, anti-carcinoembryonic antigen monoclonal antibody (MoAb), authors fusion of these types images from eight subjects suspected colorectal adenocarcinoma. Section thickness pixel size two studies were matched, coordinates corresponding points each study identified, CT sections translated, rotated, reprojected to match SPECT scans. The CT-SPECT enabled identification...