Sciweavers

5681 search results - page 1086 / 1137
» A Domain Model for eParticipation
Sort
View
CG
2007
Springer
13 years 11 months ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea
CGF
2007
157views more  CGF 2007»
13 years 11 months ago
Mesh Segmentation via Spectral Embedding and Contour Analysis
We propose a mesh segmentation algorithm via recursive bisection where at each step, a sub-mesh embedded in 3D is first spectrally projected into the plane and then a contour is ...
Rong Liu, Hao Zhang 0002
IJVR
2006
124views more  IJVR 2006»
13 years 11 months ago
Improving Virtual Reality Applications in CAD through Semantics
In this article we propose an architecture for the inclusion and exploitation of semantic aspects in a CAD environment. Our schema focuses on the enhancement and improvement of a c...
Carlos Toro, Jorge Posada, Stefan Wundrak, Andr&ea...
JISE
2008
77views more  JISE 2008»
13 years 11 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
JUCS
2008
113views more  JUCS 2008»
13 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 1086 / 1137 Last » Next »