Sciweavers

5525 search results - page 995 / 1105
» Verification of Model Transformations
Sort
View
120
Voted
PCI
2005
Springer
15 years 6 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
108
Voted
PCM
2005
Springer
209views Multimedia» more  PCM 2005»
15 years 6 months ago
Virtual Object Placement in Video for Augmented Reality
This article describes a method to insert virtual objects into a real video stream based on feature tracking and camera pose estimation from a set of single-camera video frames. To...
Jong Seung Park, Mee Young Sung, Sung-Ryul Noh
PCM
2005
Springer
122views Multimedia» more  PCM 2005»
15 years 6 months ago
High Efficient Context-Based Variable Length Coding with Parallel Orientation
Abstract. Entropy coding is one of the most important techniques in video codec. Two main criteria to assess an entropy coder are coding efficiency and friendly realization charact...
Qiang Wang, Debin Zhao, Wen Gao, Siwei Ma
88
Voted
ACMICEC
2004
ACM
112views ECommerce» more  ACMICEC 2004»
15 years 6 months ago
Business process redesign for effective e-commerce
Many companies have found out the hard way that successful ecommerce requires more than a flashy web presence. Existing business processes must be seamlessly integrated with the n...
Monique H. Jansen-Vullers, Mariska Netjes, Hajo A....
107
Voted
DOLAP
2004
ACM
15 years 6 months ago
Aggregate queries in peer-to-peer OLAP
A peer-to-peer (P2P) data management system consists essentially of a network of peer systems, each maintaining full autonomy over its own data resources. Data exchange between pe...
Mauricio Minuto Espil, Alejandro A. Vaisman