Sciweavers

383 search results - page 50 / 77
» Knowledge Integration as a Key Problem in an ERP Implementat...
Sort
View
NDSS
2005
IEEE
14 years 1 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ISMIS
2005
Springer
14 years 1 months ago
Towards Ad-Hoc Rule Semantics for Gene Expression Data
The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional (or multivalued) dependencies in databases. ...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki
ECCV
2010
Springer
14 years 5 days ago
Error-tolerant Image Compositing
Abstract. Gradient-domain compositing is an essential tool in computer vision and its applications, e.g., seamless cloning, panorama stitching, shadow removal, scene completion and...
DEBU
2008
114views more  DEBU 2008»
13 years 7 months ago
Experiences with XQuery Processing for Data and Service Federation
In this paper, we describe our experiences in building and evolving an XQuery engine with a focus on data and service federation use cases. The engine that we discuss is a core co...
Michael Blow, Vinayak R. Borkar, Michael J. Carey,...
JDCTA
2008
83views more  JDCTA 2008»
13 years 7 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong