Sciweavers

2714 search results - page 103 / 543
» Under the table interaction
Sort
View
ICC
2008
IEEE
128views Communications» more  ICC 2008»
14 years 4 months ago
Quality-of-Service Routing with Two Concave Constraints
—Routing is a process of finding a network path from a source node to a destination node. A good routing protocol should find the “best path” from a source to a destination...
Ka-Chung Leung, King-Shan Lui, Ka-Cheong Leung, Fr...
CVPR
2007
IEEE
14 years 4 months ago
High Distortion and Non-Structural Image Matching via Feature Co-occurrence
We propose a novel approach for determining if a pair of images match each other under the effect of a highdistortion transformation or non-structural relation. The co-occurrence ...
Xi Chen, Tat-Jen Cham
DEXA
2007
Springer
96views Database» more  DEXA 2007»
14 years 4 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
RULEML
2007
Springer
14 years 4 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen
WEBI
2007
Springer
14 years 4 months ago
Question Answering over Implicitly Structured Web Content
Implicitly structured content on the Web such as HTML tables and lists can be extremely valuable for web search, question answering, and information retrieval, as the implicit str...
Eugene Agichtein, Chris Burges, Eric Brill