Sciweavers

4205 search results - page 576 / 841
» Typed Mobile Objects
Sort
View
OTM
2005
Springer
14 years 1 months ago
Security Ontology for Annotating Resources
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Anya Kim, Jim Luo, Myong H. Kang
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Framework for Strategic Balancing of Knowledge Management Initiatives
Enterprises need to understand the impact of different types of knowledge management (KM) approaches on business strategy, and how they interact with other types of initiatives to...
Jan Aidemark, Håkan Sterner
ICAT
2003
IEEE
14 years 1 months ago
ARKB: 3D vision-based Augmented Reality Keyboard
In this paper, we propose a wearable 3D Augmented Reality Keyboard (ARKB) which enables a user to type text or control CG objects without using conventional interfaces, such as ke...
Minkyung Lee, Woontack Woo
VTS
2000
IEEE
167views Hardware» more  VTS 2000»
14 years 18 days ago
Path Selection for Delay Testing of Deep Sub-Micron Devices Using Statistical Performance Sensitivity Analysis
The performance of deep sub-micron designs can be affected by various parametric variations, manufacturing defects, noise or even modeling errors that are all statistical in natur...
Jing-Jia Liou, Kwang-Ting Cheng, Deb Aditya Mukher...
WCRE
2000
IEEE
14 years 18 days ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...