Sciweavers

6434 search results - page 1110 / 1287
» Model Transformations with Reference Models
Sort
View
DAGSTUHL
2006
15 years 4 months ago
Are we Ready to Embrace the Semantic Web?
action from low level features to high level semantics. Owing to the proliferation of multimedia content in the internet, there is widespread interest in the semantic web community...
Shankar Vembu, Stephan Baumann
CMS
2003
171views Communications» more  CMS 2003»
15 years 4 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
140
Voted
CSREASAM
2003
15 years 4 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
SIMVIS
2004
15 years 4 months ago
Model-based Approach to Automatic 3D Seismic Horizon Correlation across Faults
Seismic data provide detailed information about subsurface structures. Reflection events visible in the seismic data are known as horizons, and indicate boundaries between differe...
Fitsum Admasu, Klaus D. Tönnies
WSC
2004
15 years 4 months ago
An Urban Terrain Abstraction to Support Decisionmaking Using Recursive Simulation
Recursive simulation is the technique of having simulated decisionmakers themselves use simulation to inform their decisionmaking. Issues of efficiency require that the recursive ...
John B. Gilmer Jr.
« Prev « First page 1110 / 1287 Last » Next »