Sciweavers

1838 search results - page 314 / 368
» Process modelling: the deontic way
Sort
View
CGF
2010
132views more  CGF 2010»
14 years 11 months ago
Hybrid Booleans
In this paper we present a novel method to compute Boolean operations on polygonal meshes. Given a Boolean expression over an arbitrary number of input meshes we reliably and effi...
Darko Pavic, Marcel Campen, Leif Kobbelt
CORR
2010
Springer
166views Education» more  CORR 2010»
14 years 11 months ago
Software Metrics Evaluation Based on Entropy
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...
COMCOM
2008
138views more  COMCOM 2008»
14 years 11 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
EOR
2008
83views more  EOR 2008»
14 years 11 months ago
Rerouting tunnels for MPLS network resource optimization
In Multi-Protocol Label Switching (MPLS) networks, traffic demands can be routed along tunnels called Label Switched Paths (LSPs). A tunnel is characterized by a path in the netwo...
Olivier Klopfenstein
IJWIS
2008
107views more  IJWIS 2008»
14 years 11 months ago
Adaptive ontology re-use: finding and re-using sub-ontologies
Purpose The discovery of the "right" ontology or ontology part is a central ingredient for effective ontology re-use. We present an approach for supporting a form of ada...
Rodolfo Stecher, Claudia Niederée, Wolfgang...