Sciweavers

1658 search results - page 83 / 332
» Implementing Bit-addressing with Specialization
Sort
View
SEUS
2005
IEEE
14 years 2 months ago
A Case Study on Partial Evaluation in Embedded Software Design
Source code generators are often applied in embedded systems design to combine the flexibility necessary for reusability with the performance of highly specialized software. Howe...
Michael Jung, Ralf Laue 0002, Sorin A. Huss
ACIVS
2005
Springer
14 years 2 months ago
Cleaning and Enhancing Historical Document Images
In this paper we present a recursive algorithm for the cleaning and the enhancing of historical documents. Most of the algorithms, used to clean and enhance documents or transform ...
Ergina Kavallieratou, Hera Antonopoulou
BPM
2005
Springer
108views Business» more  BPM 2005»
14 years 2 months ago
From RosettaNet PIPs to BPEL Processes: A Three Level Approach for Business Protocols
Abstract. Business protocols in n-party interactions often require centralized protocol design but decentralized execution without the intervention of the designing party. In this ...
Rania Khalaf
GD
2005
Springer
14 years 2 months ago
BLer: A Boundary Labeller for Technical Drawings
In technical drawings and medical drawings/maps it is often common to explain certain features of the drawing by blocks of text that are arranged on its boundary. Bekos et. al. int...
Michael A. Bekos, Antonios Symvonis
ADBIS
2004
Springer
105views Database» more  ADBIS 2004»
14 years 2 months ago
Event Database Processing
: The purpose of the current work is to explore and improve the analysis of event data stored in event repositories, enabling the application of specialized event algebra operators...
Joris Mihaeli, Opher Etzion