Sciweavers

1760 search results - page 231 / 352
» The Focus of Requirements Engineering in Workflow Applicatio...
Sort
View
AAAI
2007
15 years 8 days ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
BXML
2004
14 years 11 months ago
Experiences Using Semantic Web Technologies to Realize an Information Retrieval System for Pathology
: Building the Semantic Web requires the use of powerful tools to create, manage and extend domain ontologies represented with Semantic Web languages. Though many tools have been a...
Elena Paslaru Bontas, Sebastian Tietz, Thomas Schr...
MMNS
1997
121views Multimedia» more  MMNS 1997»
14 years 11 months ago
Experiences in integrated multi-domain service management
Increased competition, complex service provision chains and integrated service offerings require effective techniques for the rapid integration of telecommunications services and ...
David Lewis, Thanassis Tiropanis, Alistair McEwan,...
WSC
2000
14 years 11 months ago
New results on procedures that select the best system using CRN
One use of simulation is to inform decision makers that seek to select the best of several alternative systems. The system with the highest (or lowest) mean value for simulation o...
Stephen E. Chick, Koichiro Inoue
JVCIR
2006
92views more  JVCIR 2006»
14 years 10 months ago
Overview of H.264/MPEG-4 part 10
The video coding standards are being developed to satisfy the requirements of applications for various purposes, better picture quality, higher coding efficiency, and more error r...
Soon-kak Kwon, A. Tamhankar, K. R. Rao