Sciweavers

1700 search results - page 316 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
15 years 1 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
DBPL
1997
Springer
94views Database» more  DBPL 1997»
15 years 1 months ago
Querying Multidimensional Databases
Abstract. Multidimensional databases are large collections of data, often historical, used for sophisticated analysis oriented to decision making. This activity is supported by an ...
Luca Cabibbo, Riccardo Torlone
ICCAD
1994
IEEE
122views Hardware» more  ICCAD 1994»
15 years 1 months ago
An enhanced flow model for constraint handling in hierarchical multi-view design environments
In this paper we present an enhanced design flow model that increases the capabilities of a CAD framework to support design activities on hierarchical multi-view design descriptio...
Pieter van der Wolf, K. Olav ten Bosch, Alfred van...
3DPVT
2004
IEEE
116views Visualization» more  3DPVT 2004»
15 years 1 months ago
Real-Time, Accurate Depth of Field using Anisotropic Diffusion and Programmable Graphics Cards
Computer graphics cameras lack the finite Depth of Field (DOF) present in real world ones. This results in all objects being rendered sharp regardless of their depth, reducing the...
Marcelo Bertalmío, Pere Fort, Daniel S&aacu...
EMNLP
2008
14 years 11 months ago
Integrating Multi-level Linguistic Knowledge with a Unified Framework for Mandarin Speech Recognition
To improve the Mandarin large vocabulary continuous speech recognition (LVCSR), a unified framework based approach is introduced to exploit multi-level linguistic knowledge. In th...
Xinhao Wang, Jiazhong Nie, Dingsheng Luo, Xihong W...