Sciweavers

1266 search results - page 160 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICHIM
2001
190views more  ICHIM 2001»
15 years 5 months ago
Chromatic Adaptation Post-Filtering in Image Synthesis Reproduction of Ancient Building for Restoration Support
Within the field of cultural heritage restoration, experts are interested in the analysis of data describing the condition and history of ancient monuments. Data are usually distr...
Maurizio Rossi, Daniele Marini, Alessandro Rizzi
APVIS
2008
15 years 5 months ago
Interactive Exploration of Remote Isosurfaces with Point-Based Non-Photorealistic Rendering
We present a non-photorealistic rendering technique for interactive exploration of isosurfaces generated from remote volumetric data. Instead of relying on the conventional smooth...
Guangfeng Ji, Han-Wei Shen, Jinzhu Gao
ERCIMDL
2006
Springer
139views Education» more  ERCIMDL 2006»
15 years 7 months ago
A Peer-to-Peer Architecture for Information Retrieval Across Digital Library Collections
Peer-to-peer networks have been identified as promising architectural concept for developing search scenarios across digital library collections. Digital libraries typically offer ...
Ivana Podnar, Toan Luu, Martin Rajman, Fabius Klem...
EWSPT
2003
Springer
15 years 9 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir
FORTE
2011
14 years 7 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...