Sciweavers

1116 search results - page 149 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ACSC
2005
IEEE
14 years 1 months ago
A Programming Language for Web Service Development
There is now widespread acceptance of Web services and service-oriented architectures. But despite the agreement on key Web services standards there remain many challenges. Progra...
Dominic Cooney, Marlon Dumas, Paul Roe
SEMWEB
2005
Springer
14 years 1 months ago
A String Metric for Ontology Alignment
Ontologies are today a key part of every knowledge based system. They provide a source of shared and precisely defined terms, resulting in system interoperability by knowledge sha...
Giorgos Stoilos, Giorgos B. Stamou, Stefanos D. Ko...
TVCG
2010
126views more  TVCG 2010»
13 years 6 months ago
Modeling Repetitive Motions Using Structured Light
— Obtaining models of dynamic 3D objects is an important part of content generation for computer graphics. Numerous methods have been extended from static scenarios to model dyna...
Yi Xu, Daniel G. Aliaga
CORR
2002
Springer
98views Education» more  CORR 2002»
13 years 7 months ago
Fast optical layer mesh protection using pre-cross-connected trails
Conventional optical networks are based on SONET rings, but since rings are known to use bandwidth inefficiently, there has been much research into shared mesh protection, which pr...
Timothy Y. Chow, Fabián A. Chudak, Anthony ...
INFSOF
2010
173views more  INFSOF 2010»
13 years 5 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...