Sciweavers

2477 search results - page 115 / 496
» Object list controlled process data system
Sort
View
157
Voted
ICDCSW
2009
IEEE
15 years 9 months ago
Embedded Virtual Machines for Robust Wireless Control Systems
Embedded wireless networks have largely focused on openloop sensing and monitoring. To address actuation in closedloop wireless control systems there is a strong need to re-think ...
Rahul Mangharam, Miroslav Pajic
119
Voted
ICIP
1999
IEEE
16 years 4 months ago
A Method of Shading and Shadowing in Image-Based Rendering
This paper presents a method to generate dynamic shading of image-based objects without geometric models. Since conventional rendering techniques cannot be used to render the shad...
Akihiro Katayama, Yukio Sakagawa, Hideyuki Tamura
117
Voted
CIDM
2009
IEEE
15 years 9 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
141
Voted
IPAW
2010
15 years 2 days ago
Provenance of Software Development Processes
Abstract. "Why does the build fail currently?" - This and similar questions arise on a daily basis in software development processes (SDP). There is no easy way to answer...
Heinrich Wendel, Markus Kunde, Andreas Schreiber
145
Voted
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
15 years 4 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik