Sciweavers

4815 search results - page 916 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
133
Voted
ICRE
1998
IEEE
15 years 7 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
VISUALIZATION
1997
IEEE
15 years 7 months ago
Constrained 3D navigation with 2D controllers
Navigation through 3D spaces is required in many interactive graphics and virtual reality applications. We consider the subclass of situations in which a 2D device such as a mouse...
Andrew J. Hanson, Eric A. Wernert
BROADNETS
2004
IEEE
15 years 6 months ago
Diverse Routing for Shared Risk Resource Groups (SRRG) Failures in WDM Optical Networks
Failure resilience is one of the desired features of the Internet. Most of the traditional restoration architectures are based on single-failure assumption which is unrealistic. M...
Pallab Datta, Arun K. Somani
ECCV
2006
Springer
15 years 6 months ago
Motion Segmentation Using an Occlusion Detector
We present a novel method for the detection of motion boundaries in a video sequence based on differential properties of the spatio-temporal domain. Regarding the video sequence as...
Doron Feldman, Daphna Weinshall
HT
1991
ACM
15 years 6 months ago
Implementing Hypertext Database Relationships through Aggregations and Exceptions
In order to combine hypertext with database facilities, we show how to extract an effective storage structure from given instance relationships. The schema of the structure recogn...
Yoshinori Hara, Arthur M. Keller, Gio Wiederhold