Sciweavers

832 search results - page 126 / 167
» Characteristic Patterns for LTL
Sort
View
SSWMC
2004
15 years 5 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
VISSYM
2004
15 years 5 months ago
Texture-Based Flow Visualization on Isosurfaces
Isosurfacing, by itself, is a common visualization technique for investigating 3D vector fields. Applying texturebased flow visualization techniques to isosurfaces provides engine...
Robert S. Laramee, Jürgen Schneider, Helwig H...
MMNS
2003
135views Multimedia» more  MMNS 2003»
15 years 5 months ago
Pervasive Accounting of Resource Consumption for Wireless Services with Adaptive QoS
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
WDAS
1998
15 years 5 months ago
Data Replication and Delay Balancing in Heterogeneous Disk Systems
Declustering and replication are well known techniques used to improve response time of queries in parallel disk environments. As data replication incurs a penalty for updates, da...
Doron Rotem, Sridhar Seshadri, Luis M. Bernardo
CASCON
1996
120views Education» more  CASCON 1996»
15 years 5 months ago
Communication costs in code and design reviews: an empirical study
Software development managers strive to control all of the factors that might impact the success of their projects. However, not all of these factors have been identified, much le...
Carolyn B. Seaman