Sciweavers

1795 search results - page 289 / 359
» Security Models and Information Flow
Sort
View
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
13 years 10 months ago
Inter-organizational Knowledge Transfer in the Buyer-Supplier Relationship: A Buyer's Perspective
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...
Sung-Byung Yang, Young-Gul Kim
DOCENG
2008
ACM
13 years 10 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
CAINE
2007
13 years 10 months ago
A Novel Peak Detection Algorithm for Use in the Study of Machining Chip Segmentation
The study of how metal deforms and flows as parts are machined yields important insights into the metal cutting process. Improvements in high-speed digital imaging and image proce...
Eric Whitenton, Robert Ivester, Jarred Heigel
ECCV
2010
Springer
13 years 10 months ago
Joint Estimation of Motion, Structure and Geometry from Stereo Sequences
We present a novel variational method for the simultaneous estimation of dense scene flow and structure from stereo sequences. In contrast to existing approaches that rely on a ful...
Levi Valgaerts, Andrés Bruhn, Henning Zimme...
JDA
2006
77views more  JDA 2006»
13 years 9 months ago
On Multi-threaded Metrical Task Systems
Traditionally, on-line problems have been studied under the assumption that there is a unique sequence of requests that must be served. This approach is common to most general mod...
Esteban Feuerstein, Steven S. Seiden, Alejandro St...