Sciweavers

5722 search results - page 1108 / 1145
» Security Function Interactions
Sort
View
HICSS
2003
IEEE
96views Biometrics» more  HICSS 2003»
14 years 3 months ago
On the e-Negotiation of Unmatched Logrolling Views
An e-Negotiation process comprises computerfacilitated tasks, each of which aims at resolving an issue or a collection of co-related issues under negotiation. It involves an itera...
Shing-Chi Cheung, Patrick C. K. Hung, Dickson K. W...
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...
ICRA
2003
IEEE
110views Robotics» more  ICRA 2003»
14 years 3 months ago
Modelling of the human paralysed lower limb under FES
— The new generation of implanted neuroprostheses allows muscles to be controlled with fine accuracy, high selectivity and the repeatability of the muscle’s response can be ach...
David Guiraud, Philippe Poignet, Pierre-Brice Wieb...
IPPS
2003
IEEE
14 years 3 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...
VISUALIZATION
2003
IEEE
14 years 3 months ago
Visualizing Industrial CT Volume Data for Nondestructive Testing Applications
This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for nondestructive testing (N...
Runzhen Huang, Kwan-Liu Ma, Patrick S. McCormick, ...
« Prev « First page 1108 / 1145 Last » Next »