Sciweavers

8068 search results - page 1519 / 1614
» Java Data Objects
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 4 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ICCSA
2007
Springer
15 years 3 months ago
3D Spatial Operations in Geo DBMS Environment for 3D GIS
Next generation of GIS software should be able to manipulate and analyse complex situations of real world phenomena. One of the desired components in such software or system is the...
Chen Tet-Khuan, Alias Abdul-Rahman, Sisi Zlatanova
LCTRTS
2007
Springer
15 years 3 months ago
External memory page remapping for embedded multimedia systems
As memory speeds and bus capacitances continue to rise, external memory bus power will make up an increasing portion of the total system power budget for system-on-a-chip embedded...
Ke Ning, David R. Kaeli
SEMWEB
2007
Springer
15 years 3 months ago
Hybrid Alignment Strategy for Anatomical Ontologies: Results of the 2007 Ontology Alignment Contest
An ontology is a formal representation of a domain modeling the entities in the domain and their relations. When a domain is represented by multiple ontologies, there is a need for...
Songmao Zhang, Olivier Bodenreider
WAPCV
2007
Springer
15 years 3 months ago
Embodied Active Vision in Language Learning and Grounding
Abstract. Most cognitive studies of language acquisition in both natural systems and artificial systems have focused on the role of purely linguistic information as the central co...
Chen Yu
« Prev « First page 1519 / 1614 Last » Next »