Sciweavers

2518 search results - page 425 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
CPHYSICS
2007
71views more  CPHYSICS 2007»
15 years 3 months ago
Simulation of n-qubit quantum systems. III. Quantum operations
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
T. Radtke, S. Fritzsche
TIM
2010
168views Education» more  TIM 2010»
14 years 9 months ago
Thermal Event Recognition Applied to Protection of Tokamak Plasma-Facing Components
Magnetic confinement fusion tokamaks are complex devices where a large amount of power is required to make the fusion reactions happen. In such experimental conditions, Plasma Faci...
Vincent Martin, Jean-Marcel Travere, Franço...
SSDBM
2011
IEEE
257views Database» more  SSDBM 2011»
14 years 6 months ago
Database-as-a-Service for Long-Tail Science
Database technology remains underused in science, especially in the long tail  the small labs and individual researchers that collectively produce the majority of scientic output...
Bill Howe, Garrett Cole, Emad Souroush, Paraschos ...
ICDAR
2005
IEEE
15 years 8 months ago
Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons
Automatic text recognition from natural images receives a growing attention because of potential applications in image retrieval, robotics and intelligent transport system. Camera...
Nobuo Ezaki, Kimiyasu Kiyota, Bui Truong Minh, Mar...
CHI
2002
ACM
16 years 3 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger