Sciweavers

43 search results - page 4 / 9
» Using VRML to Access Manufacturing Data
Sort
View
VRML
2006
ACM
14 years 1 months ago
A case for 3D streaming on peer-to-peer networks
One of the most serious issues holding back the widespread of 3D contents on Internet has been their inaccessibility due to large data volume. Many compression and progressive tra...
Shun-Yun Hu
HT
1997
ACM
13 years 12 months ago
Designing Dexter-Based Hypermedia Services for the World Wide Web
This paper discusses how to augment the WWW with a Dexter-based hypermedia service that provides anchors, links and composites as objects stored external to the Web pages. The hyp...
Kaj Grønbæk, Niels Olof Bouvin, Lenne...
GI
2010
Springer
13 years 6 months ago
A Method for Constructing Enterprise-wide Access Views on Business Objects
: Modern application landscapes consist of a multitude of inter-connected business applications exchanging data in manifold ways. These business applications are used by employees ...
Sabine Buckl, Florian Matthes, Sascha Roth, Christ...
IJDE
2006
77views more  IJDE 2006»
13 years 7 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
DAC
2008
ACM
14 years 8 months ago
On reliable modular testing with vulnerable test access mechanisms
In modular testing of system-on-a-chip (SoC), test access mechanisms (TAMs) are used to transport test data between the input/output pins of the SoC and the cores under test. Prio...
Lin Huang, Feng Yuan, Qiang Xu