Results 21 to 30 of about 2,499 (183)

Carrier-Scale Packet Processing Architecture Using Interleaved 3D-Stacked DRAM and Its Analysis

open access: yesIEEE Access, 2019
New network services such as the Internet of Things and edge computing are accelerating the increase in traffic volume, the number of connected devices, and the diversity of communication.
Tomohiro Korikawa   +3 more
doaj   +1 more source

Renaissance vaults: geometry, nurbs and computational opportunities for reconstruction

open access: yesDisegnare con, 2021
Creating an interpretative geometric representation of architectural shapes is crucial to learn the essence of any architecture, to preserve it and to hand it down through the ages to our descendants.
Cecilia Maria Bolognesi   +1 more
doaj  

A NEW PROTOCOL FOR TEXTURE MAPPING PROCESS AND 2D REPRESENTATION OF RUPESTRIAN ARCHITECTURE [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2018
The development of the survey techniques for architecture and archaeology requires a general review in the methods used for the representation of numerical data.
L. Carnevali, M. Carpiceci, A. Angelini
doaj   +1 more source

GEOMETRIC PRIMITIVES ASSESSING ITALIAN-CZECH VAULT CONSTRUCTION TECHNIQUES IN BAROQUE PERIOD [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2019
The developments of the latest technology in the field of Digital Cultural Heritage (DCH) are revolutionizing the methods of surveying, representing and managing the built heritage.
C. Stanga   +4 more
doaj   +1 more source

Tile vault architecture and construction around Eduardo Sacriste

open access: yesInformes de la Construccion, 2012
En torno a la figura del arquitecto Eduardo Sacriste (1905-1999), conocido estudioso de la construcción abovedada, surgió en la arquitectura argentina de las décadas centrales del siglo XX una prolífica generación de arquitectos que levantaron edificios –viviendas principalmente– cubiertos con bóvedas tabicadas, o con ingeniosas variantes sobre este ...
García, J.   +2 more
openaire   +2 more sources

Additional load on barrel vaults of architectural monuments

open access: yesИнженерно-строительный журнал, 2018
В старинных зданиях, являющиеся памятниками архитектуры, часто в виде несущих элементов использовались каменные трехцентровые коробовые своды и арки. При реконструкции сооружений появляется необходимость увеличения нагрузки на эти элементы. Определение величины дополнительной нагрузки основано на результатах инструментального обследования сводов.
Kaldar-Ool, Anay-Khaak   +3 more
openaire   +2 more sources

Restoration of the vault of the open chapel at teposcolula in Oaxaca; Mexico

open access: yesLoggia, Arquitectura & Restauración, 2007
The extraordinary vault of this open chapel, one of the most unique examples of 16th century Latin-American architecture, has been subjected to a philological reconstruction as a result of its local and historiographic importance.
Benjamín Ibarra Sevilla
doaj   +1 more source

Architecture - re-Construction - Geometry: a knowledge path applied to the study of Plantery's vaults in Turin

open access: yesDisegnare con, 2012
Plantery's vaults, by the name of the architect working in Turin since first years of '700, are composed by a main vault intersected by some axial and angular secondary vaults.
Roberta Spallone, Marco Vitali
doaj   +1 more source

Alexandre Herculano’s “A abóbada (1401)”: a parodied forgery and coarse replicas of a patriotic narrative about Batalha

open access: yesRevista de História da Sociedade e da Cultura
This article focuses on the short story “A abóbada (1401)” (The vault [1401]) by the Portuguese author Alexandre Herculano with a view to analyse the origin and development of a narrative that established national and international debates on the ...
Pedro Redol
doaj   +1 more source

VLSI Architecture of the Fuzzy Fingerprint Vault System [PDF]

open access: yes, 2010
User authentication using fingerprint information provides convenience as well as strong security at the same time. However, serious problems may cause if fingerprint information stored for user authentication is used illegally by a different person since it cannot be changed freely as a password due to a limited number of fingers.
Sung Jin Lim   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy