Sciweavers

14824 search results - page 2711 / 2965
» Security - Introduction
Sort
View
DLS
2008
264views Languages» more  DLS 2008»
15 years 4 months ago
Contextual values
Context-oriented programming proposes to treat execution context explicitly and to provide means for context-dependent adaptation at runtime. There are many mechanisms that can be...
Éric Tanter
DRR
2008
15 years 4 months ago
Interactive degraded document enhancement and ground truth generation
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
G. Bal, Gady Agam, Ophir Frieder, Gideon Frieder
HPDC
2010
IEEE
15 years 4 months ago
A data transfer framework for large-scale science experiments
Modern scientific experiments can generate hundreds of gigabytes to terabytes or even petabytes of data that may furthermore be maintained in large numbers of relatively small fil...
Wantao Liu, Brian Tieman, Rajkumar Kettimuthu, Ian...
EUROSSC
2008
Springer
15 years 4 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 3 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
« Prev « First page 2711 / 2965 Last » Next »