Sciweavers

6434 search results - page 1218 / 1287
» Model Transformations with Reference Models
Sort
View
WINE
2009
Springer
178views Economy» more  WINE 2009»
14 years 4 months ago
Computing Optimal Contracts in Series-Parallel Heterogeneous Combinatorial Agencies
We study an economic setting in which a principal motivates a team of strategic agents to exert costly effort toward the success of a joint project. The action taken by each agent...
Yuval Emek, Michal Feldman
CIVR
2009
Springer
130views Image Analysis» more  CIVR 2009»
14 years 4 months ago
Exploring inter-concept relationship with context space for semantic video indexing
Semantic concept detectors are often individually and independently developed. Using peripherally related concepts for leveraging the power of joint detection, which is referred t...
Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo
ESWS
2009
Springer
14 years 4 months ago
Collaborative Ocean Resource Interoperability: Multi-use of Ocean Data on the Semantic Web
: Earth Observations (EO) collect various characteristics of the objective environment using sensors which often have different measuring, spatial and temporal coverage. Making ind...
Feng (Barry) Tao, Jon Campbell, Maureen Pagnani, G...
ESWS
2009
Springer
14 years 4 months ago
An Ontology of Resources: Solving the Identity Crisis
The primary goal of the Semantic Web is to use URIs as a universal space to name anything, expanding from using URIs for webpages to URIs for “real objects and imaginary concepts...
Harry Halpin, Valentina Presutti
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 4 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
« Prev « First page 1218 / 1287 Last » Next »