Sciweavers

4187 search results - page 721 / 838
» A Taxonomy of Model Transformation
Sort
View
114
Voted
IMC
2005
ACM
15 years 7 months ago
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage
Interference has always been considered as an unavoidable peril in wireless networks. A single data transmission is useful to some nodes and becomes interference to others. Based ...
Arunesh Mishra, Eric Rozner, Suman Banerjee, Willi...
KCAP
2005
ACM
15 years 7 months ago
An Approach to Ontology Mapping Negotiation
Ontology mapping negotiation aims to achieve consensus among real-world entities about the process of transforming information between different models (ontologies). This paper de...
Nuno Silva, Paulo Maio, João Rocha
MM
2005
ACM
192views Multimedia» more  MM 2005»
15 years 7 months ago
Video2Cartoon: generating 3D cartoon from broadcast soccer video
In this demonstration, a prototype system for generating 3D cartoon from broadcast soccer video is proposed. This system takes advantage of computer vision (CV) and computer graph...
Dawei Liang, Yang Liu, Qingming Huang, Guangyu Zhu...
PPOPP
2005
ACM
15 years 7 months ago
A novel approach for partitioning iteration spaces with variable densities
Efficient partitioning of parallel loops plays a critical role in high performance and efficient use of multiprocessor systems. Although a significant amount of work has been don...
Arun Kejariwal, Alexandru Nicolau, Utpal Banerjee,...
SACMAT
2005
ACM
15 years 7 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...