Sciweavers

7351 search results - page 1369 / 1471
» Segmenting Point Sets
Sort
View
EURODAC
1994
IEEE
221views VHDL» more  EURODAC 1994»
14 years 2 months ago
Implementation of a SDH STM-N IC for B-ISDN using VHDL based synthesis tools
payload. The current recommendations include SDH as the physical layer transmission standard. It is defined the BISDN user network interface (UNI) SDH-based at 155.52 Mbit/s, but t...
Juan Carlos Calderón, Enric Corominas, Jos&...
VLDB
1989
ACM
98views Database» more  VLDB 1989»
14 years 2 months ago
A Family of Incomplete Relational Database Models
In this paper. we utilize intervals for unknown values in incompleterelational databases.We usetablesto representunknown relations. First, we define three partial tuple types in a...
Adegbemiga Ola, Gultekin Özsoyoglu
CCA
2009
Springer
14 years 2 months ago
Effective Choice and Boundedness Principles in Computable Analysis
Abstract. In this paper we study a new approach to classify mathematical theorems according to their computational content. Basically, we are asking the question which theorems can...
Vasco Brattka, Guido Gherardi
ELPUB
2007
ACM
14 years 2 months ago
Managing Expectations for Open Access in Greece: Perceptions from the Publishers and Academic Libraries
In Greece, there seems to be a growing level of awareness regarding open access among scholars, faculty staff and information professionals. Indeed, consensus regarding the necess...
G. Christina Banou, A. Petros Kostagiolas
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
14 years 2 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
« Prev « First page 1369 / 1471 Last » Next »