Sciweavers

1795 search results - page 289 / 359
» Security Models and Information Flow
Sort
View
107
Voted
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
15 years 5 months ago
Inter-organizational Knowledge Transfer in the Buyer-Supplier Relationship: A Buyer's Perspective
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...
Sung-Byung Yang, Young-Gul Kim
120
Voted
DOCENG
2008
ACM
15 years 5 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
128
Voted
CAINE
2007
15 years 5 months ago
A Novel Peak Detection Algorithm for Use in the Study of Machining Chip Segmentation
The study of how metal deforms and flows as parts are machined yields important insights into the metal cutting process. Improvements in high-speed digital imaging and image proce...
Eric Whitenton, Robert Ivester, Jarred Heigel
138
Voted
ECCV
2010
Springer
15 years 4 months ago
Joint Estimation of Motion, Structure and Geometry from Stereo Sequences
We present a novel variational method for the simultaneous estimation of dense scene flow and structure from stereo sequences. In contrast to existing approaches that rely on a ful...
Levi Valgaerts, Andrés Bruhn, Henning Zimme...
111
Voted
JDA
2006
77views more  JDA 2006»
15 years 3 months ago
On Multi-threaded Metrical Task Systems
Traditionally, on-line problems have been studied under the assumption that there is a unique sequence of requests that must be served. This approach is common to most general mod...
Esteban Feuerstein, Steven S. Seiden, Alejandro St...