Sciweavers

2070 search results - page 390 / 414
» A Reduced-Basis Element Method
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 4 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ROBOCUP
2009
Springer
128views Robotics» more  ROBOCUP 2009»
14 years 4 months ago
Sensor and Information Fusion Applied to a Robotic Soccer Team
This paper is focused on the sensor and information fusion techniques used by a robotic soccer team. Due to the fact that the sensor information is affected by noise, and taking in...
João Silva, Nuno Lau, João Rodrigues...
SSD
2009
Springer
145views Database» more  SSD 2009»
14 years 4 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
DOCENG
2009
ACM
14 years 4 months ago
Annotations with EARMARK for arbitrary, overlapping and out-of order markup
In this paper we propose a novel approach to markup, called Extreme Annotational RDF Markup (EARMARK), using RDF and OWL to annotate features in text content that cannot be mapped...
Silvio Peroni, Fabio Vitali
IWCMC
2009
ACM
14 years 4 months ago
Adaptive antenna selection at mobile stations for SDMA in WiMAX networks
The IEEE 802.16/WiMAX standards has fully embraced multi-antenna technology and can, thus, deliver robust performance and high transmission rates. Nevertheless, due to its inheren...
Tairan Wang, Zhifeng Tao, Andreas F. Molisch, Phil...