Sciweavers

951 search results - page 56 / 191
» Suggestions for OWL 3
Sort
View
RE
2001
Springer
15 years 2 months ago
Software Acquisition: A Business Strategy Analysis
This paper argues that there are new insights to be gained from a strategic analysis of requirements engineering. The paper is motivated by a simple question: what does it take to...
Barbara Farbey, Anthony Finkelstein
FUN
2007
Springer
80views Algorithms» more  FUN 2007»
15 years 1 months ago
The Traveling Beams Optical Solutions for Bounded NP-Complete Problems
Architectures for optical processors designed to solve bounded instances of NP-Complete problems are suggested. One approach mimics the traveling salesman by traveling beams that ...
Shlomi Dolev, Hen Fitoussi
FSE
2006
Springer
114views Cryptology» more  FSE 2006»
15 years 1 months ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
VMV
2004
144views Visualization» more  VMV 2004»
14 years 11 months ago
Exploiting Mirrors in Interactive Reconstruction with Structured Light
This paper describes how a mirror can be integrated as another view and another source of light patterns in an interactive reconstruction system with structured light, where the o...
Emric Epstein, Martin Granger-Piché, Pierre...
JCIT
2008
127views more  JCIT 2008»
14 years 9 months ago
Image Segmentation Method Using Hybrid Region Flow
This paper suggests an efficient image segmentation algorithm in 3 steps for grayscale images. First step is the segmentation as homogenous region on image. And, second step is me...
Jae Hyup Kim, Kyung Hyun Jang, Young Shik Moon