Sciweavers

951 search results - page 56 / 191
» Suggestions for OWL 3
Sort
View
RE
2001
Springer
15 years 4 months ago
Software Acquisition: A Business Strategy Analysis
This paper argues that there are new insights to be gained from a strategic analysis of requirements engineering. The paper is motivated by a simple question: what does it take to...
Barbara Farbey, Anthony Finkelstein
FUN
2007
Springer
80views Algorithms» more  FUN 2007»
15 years 3 months ago
The Traveling Beams Optical Solutions for Bounded NP-Complete Problems
Architectures for optical processors designed to solve bounded instances of NP-Complete problems are suggested. One approach mimics the traveling salesman by traveling beams that ...
Shlomi Dolev, Hen Fitoussi
FSE
2006
Springer
114views Cryptology» more  FSE 2006»
15 years 3 months ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
VMV
2004
144views Visualization» more  VMV 2004»
15 years 1 months ago
Exploiting Mirrors in Interactive Reconstruction with Structured Light
This paper describes how a mirror can be integrated as another view and another source of light patterns in an interactive reconstruction system with structured light, where the o...
Emric Epstein, Martin Granger-Piché, Pierre...
JCIT
2008
127views more  JCIT 2008»
14 years 11 months ago
Image Segmentation Method Using Hybrid Region Flow
This paper suggests an efficient image segmentation algorithm in 3 steps for grayscale images. First step is the segmentation as homogenous region on image. And, second step is me...
Jae Hyup Kim, Kyung Hyun Jang, Young Shik Moon