Sciweavers

14078 search results - page 2764 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
SACMAT
2011
ACM
14 years 4 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
CIKM
2011
Springer
14 years 1 months ago
An efficient method for using machine translation technologies in cross-language patent search
Topics in prior-art patent search are typically full patent applications and relevant items are patents often taken from sources in different languages. Cross language patent retr...
Walid Magdy, Gareth J. F. Jones
DAC
2012
ACM
13 years 4 months ago
WCET-centric partial instruction cache locking
Caches play an important role in embedded systems by bridging the performance gap between high speed processors and slow memory. At the same time, caches introduce imprecision in ...
Huping Ding, Yun Liang, Tulika Mitra
ICIP
2008
IEEE
16 years 3 months ago
Image registration using Adaptive Polar Transform
Image registration is an essential step in many image processing applications that need visual information from multiple images for comparison, integration or analysis. Recently r...
Rittavee Matungka, Yuan F. Zheng, Robert L. Ewing
MICCAI
2005
Springer
16 years 2 months ago
Automated Surface Matching Using Mutual Information Applied to Riemann Surface Structures
Many medical imaging applications require the computation of dense correspondence vector fields that match one surface with another. To avoid the need for a large set of manually-d...
Yalin Wang, Ming-Chang Chiang, Paul M. Thompson
« Prev « First page 2764 / 2816 Last » Next »