Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Enterprises need to understand the impact of different types of knowledge management (KM) approaches on business strategy, and how they interact with other types of initiatives to...
In this paper, we propose a wearable 3D Augmented Reality Keyboard (ARKB) which enables a user to type text or control CG objects without using conventional interfaces, such as ke...
The performance of deep sub-micron designs can be affected by various parametric variations, manufacturing defects, noise or even modeling errors that are all statistical in natur...
Jing-Jia Liou, Kwang-Ting Cheng, Deb Aditya Mukher...
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...