Sciweavers

1361 search results - page 30 / 273
» Skeletonization of Digital Objects
Sort
View
173
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 6 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
127
Voted
DOCENG
2009
ACM
15 years 12 days ago
Relating declarative hypermedia objects and imperative objects through the NCL glue language
This paper focuses on the support provided by NCL (Nested Context Language) to relate objects with imperative code content and declarative hypermedia-objects (objects with declara...
Luiz Fernando Gomes Soares, Marcelo Ferreira Moren...
137
Voted
BMVC
2000
15 years 4 months ago
Quantifying Ambiguities in Inferring Vector-Based 3D Models
This paper presents a framework for directly addressing issues arising from self-occlusions and ambiguities due to the lack of depth information in vector-based representations. V...
Eng-Jon Ong, Shaogang Gong
WWW
2009
ACM
16 years 3 months ago
A method of analyzing credibility based on LOD control of digital maps
Digital maps are widely used and appear on all types of platforms for integrating content. Users can change display region and scale by panning, zooming in, and zooming out on a d...
Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya
CLUSTER
2003
IEEE
15 years 8 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen