Chapter RDF
pages:- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- Transferring a Question-Based Dialog Framework to a Distributed Architecture
- Transferring an Outcome-Oriented Learning Architecture to an IT Learning Game
- Transferring off-road control concepts to watercraft used in flooded areas
- Transformable IT Landscapes: IT Architectures Are Standardized, Modular, Flexible, Ubiquitous, Elastic, Cost-Effective, and Secure
- Transformation or Transgression? Initiation and Transition Rituals in the Attic Cult of Artemis
- Transforming a Totalitarian Edifice: Artistic and Ethnographic Engagements with the House of the People in Bucharest
- Transforming ISO 1101 Tolerances into Vectorial Tolerance Representations — A CAD-Based Approach
- Transition to Service-Oriented Enterprise Architecture
- Transitioning Legacy Assets to a Product Line Architecture
- Translucent Insulation for Passive Solar Energy Utilization in Buildings
- Translucent Replication for Service Level Assurance
- Transnational Planning Education and the Internationalization
- Transparent Insulating Materials — A Possibility for Reducing the Consumption of Fossil Fuel in Households
- TRANSRAZ Data Model: Towards a Geosocial Representation of Historical Cities
- TRASS
- Trends in computer system structure and architecture
- Trends in Robotic Software Frameworks
- TRESOR – Towards the Realization of a Trusted Cloud Ecosystem
- Triaxial Deformation in Proton-Odd Cs Nuclei
- True Shared Memory Programming on SCI-based Clusters
- Trust Mechanisms and Reputation Systems
- Trust Relationships in Privacy-ABCs’ Ecosystems
- Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment
- Trusted Computing Serving an Anonymity Service
- Trusted Implementation and Enforcement of Application Security Policies
- Trusted, Decentralized and Blockchain-Based M2M Application Service Provision
- TUM-AgeTech
- TUMsBendingUnits from TU Munich: RoboCup 2012 Logistics League Champion
- Tunnelling on the Penzance and St. Ives sewerage scheme, Cornwall, England
- Two Approaches for the Design of Molded Interconnect Devices (3D-MID)