Extensible Device Metadata

Known as: XDM, XDM (file format) 
The Extensible Device Metadata (XDM) specification is an open file format for embedding device-related metadata in JPEG and other common image files… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1983-2015
02419832015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Using NoSQL stores as storage layer for the execution of declarative query processing using XQuery provides a highlevel interface… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The key objective of OPUCE system is to enable the participation of end-users in the management of their own services, by… (More)
Is this relevant?
2009
2009
One of the major deficiencies of the standard density functionals is their inability to describe dispersion interactions. Becke… (More)
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper presents two extensions for XQuery. The first extension allows the definition and processing of different kinds of… (More)
  • figure 4
  • figure 5
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
2007
2007
Subscriber databases are substantial points of any network. Evolution from classical telecommunication networks to NGN has… (More)
  • figure 1
  • figure 2
Is this relevant?
2004
2004
This paper presents a system for efficient data transformations between XML and relational databases, called XML Data Mediator… (More)
  • figure 1
Is this relevant?
2002
2002
Inductive databases are intended to be general purpose databases in which both source data and mined patterns can be represented… (More)
Is this relevant?
2002
2002
Animated Agents are endowed with personality (and emotions), with the aim of increasing their believability and of establishing… (More)
  • table 1
  • table 2
Is this relevant?
1999
1999
We show how a formal model of interaction can be employed to generate documentation on how to use an application, in the form of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1996
1996
This paper discusses lessons learned from a selection of computer security problems that have surfaced in the recent past, and… (More)
Is this relevant?