Sciweavers

1061 search results - page 138 / 213
» Integrity Constraints for Linked Data
Sort
View
IJIG
2002
138views more  IJIG 2002»
13 years 9 months ago
A Practical Approach for 3D Building Modeling from Uncalibrated Video Sequences
This paper presents an approach for reconstructing a realistic 3D model of a building from its uncalibrated video sequences taken by a hand-held camera. The novelty of this approa...
Yong Liu, Chengke Wu, Hung-Tat Tsui
IEEEARES
2010
IEEE
14 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ACHI
2009
IEEE
14 years 4 months ago
A Model-Driven Development Approach Focusing Human Interaction
Human interaction like entering some data, making decisions etc. has to be dealt with as an integral part of today’s business processes and the supporting IT likewise. Hence, hu...
Stefan Link, Philip Hoyer, Tilmann Kopp, Sebastian...
IPPS
2000
IEEE
14 years 2 months ago
Fault-Tolerant Distributed-Shared-Memory on a Broadcast-Based Interconnection Network
The Simultaneous Optical Multiprocessor Exchange Bus (SOME-Bus) is a low-latency, high-bandwidth interconnection network which directly links arbitrary pairs of processor nodes wit...
Diana Hecht, Constantine Katsinis
CORR
2007
Springer
162views Education» more  CORR 2007»
13 years 10 months ago
Exploiting Social Annotation for Automatic Resource Discovery
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Anon Plangprasopchok, Kristina Lerman