Sciweavers

3645 search results - page 643 / 729
» Implementing mapping composition
Sort
View
EWC
2006
114views more  EWC 2006»
14 years 10 months ago
Automated symmetry exploitation in engineering analysis
In engineering analysis, geometric symmetry, when exploited, has two potential benefits: (1) it can significantly reduce the computational time, and (2) it can simultaneously impr...
Krishnan Suresh, Ameya Sirpotdar
INFSOF
2006
81views more  INFSOF 2006»
14 years 9 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
JDCTA
2008
87views more  JDCTA 2008»
14 years 9 months ago
M-Brochure
Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists...
Mohammad Shirali-Shahreza
JWSR
2008
99views more  JWSR 2008»
14 years 9 months ago
A Reservation-based Extended Transaction Protocol for Coordination of Web Services
: Web Services can be used to automate business activities that span multiple enterprises over the Internet. Such business activities require a coordination protocol to reach consi...
Wenbing Zhao, Firat Kart, Louise E. Moser, P. M. M...
JFR
2006
109views more  JFR 2006»
14 years 9 months ago
Alice: An information-rich autonomous vehicle for high-speed desert navigation
This paper describes the implementation and testing of Alice, the California Institute of Technology's entry in the 2005 DARPA Grand Challenge. Alice utilizes a highly networ...
Lars B. Cremean, Tully B. Foote, Jeremy H. Gillula...