Sciweavers

1195 search results - page 189 / 239
» What, Where
Sort
View
RR
2010
Springer
13 years 6 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
CCCG
2010
13 years 5 months ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick
TWC
2010
13 years 2 months ago
Dual-hop adaptive packet transmission systems with regenerative relaying
We propose and analyze two different approaches for performing adaptive modulation and coding (AMC) in dualhop transmission systems, where a source node S communicates with a certa...
Andreas Müller 0001, Hong-Chuan Yang
ICASSP
2011
IEEE
12 years 11 months ago
Compression using self-similarity-based temporal super-resolution for full-exposure-time video
In order to allow sufficient amount of light into the image sensor, videos captured in poor lighting conditions typically have low frame rate and frame exposure time equals to in...
Mihoko Shimano, Gene Cheung, Imari Sato

Lecture Notes
4961views
15 years 5 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston