Sciweavers

1561 search results - page 289 / 313
» Mobile Process Support Systems - Experiences from a case stu...
Sort
View
JITECH
2008
57views more  JITECH 2008»
13 years 8 months ago
Offshore middlemen: transnational intermediation in technology sourcing
The tendency of acquiring information systems and other high technology services from international suppliers continues at unprecedented levels. The primary motivation for the off...
Volker Mahnke, Jonathan Wareham, Niels Bjør...
WWW
2005
ACM
14 years 9 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
IWSOC
2005
IEEE
133views Hardware» more  IWSOC 2005»
14 years 2 months ago
Design Mapping, and Simulations of a 3G WCDMA/FDD Basestation Using Network on Chip
This paper presents a case study of a single-chip 3G WCDMA/FDD basestation implementation based on a circuit-switched network on chip. As the amount of transistors on a chip conti...
Daniel Wiklund, Dake Liu
ICCV
1995
IEEE
14 years 11 days ago
A Multi-Body Factorization Method for Motion Analysis
The structure-from-motion problem has been extensively studied in the field of computer vision. Yet, the bulk of the existing work assumes that the scene contains only a single m...
João Paulo Costeira, Takeo Kanade
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu