Sciweavers

1154 search results - page 188 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
GIS
2007
ACM
14 years 8 months ago
Exploiting automatically inferred constraint-models for building identification in satellite imagery
The building identification (BID) problem is based on a process that uses publicly available information to automatically assign addresses to buildings in satellite imagery. In pr...
Martin Michalowski, Craig A. Knoblock, Kenneth M. ...
ICIP
2009
IEEE
14 years 8 months ago
Selective And Scalable Encryption Of Enhancement Layers For Dyadic Scalable H.264/avc By Scrambling Of Scan Patterns
This paper presents a new selective and scalable encryption (SSE) method for intra dyadic scalable coding framework based on wavelet/subband (DWTSB) for H.264/AVC. It has been ach...
SIGSOFT
2003
ACM
14 years 8 months ago
Ontology support for web service processes
Web Services are software services that can be advertised by providers and deployed by customers using Web technologies. This concept is currently carried further to address Web s...
Claus Pahl, Michael Casey
WWW
2007
ACM
14 years 8 months ago
Ontology Maturing: a Collaborative Web 2.0 Approach to Ontology Engineering
Most of the current methodologies for building ontologies rely on specialized knowledge engineers. This is in contrast to real-world settings, where the need for maintenance of do...
Simone Braun, Andreas Schmidt, Andreas Walter, G&a...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Mining Software Engineering Data
Software engineering data (such as code bases, execution traces, historical code changes, mailing lists, and bug databases) contains a wealth of information about a project's...
Tao Xie, Jian Pei, Ahmed E. Hassan