Sciweavers

657 search results - page 103 / 132
» Assessment of E-Business Transformation Using Simulation Mod...
Sort
View
NPAR
2004
ACM
15 years 3 months ago
Rendering cracks in Batik
We present an algorithm for simulating the cracks found in Batik wax painting and dyeing technique used to make images on cloth. The algorithm produces cracks similar to those fou...
Brian Wyvill, Cornelius W. A. M. van Overveld, M. ...
MHCI
2004
Springer
15 years 3 months ago
Dynamic Primitives for Gestural Interaction
We describe the implementation of an interaction technique which allows users to store and retrieve information and computational functionality on different parts of their body. W...
Steven Strachan, Roderick Murray-Smith, Ian Oakley...
CN
2008
140views more  CN 2008»
14 years 9 months ago
Congestion control in utility fair networks
This paper deals with a congestion control framework for elastic and real-time traffic, where the user's application is associated with a utility function. We allow users to ...
Tobias Harks, Tobias Poschwatta
76
Voted
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 3 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
WMASH
2003
ACM
15 years 2 months ago
End-to-end throughput and delay assurances in multihop wireless hotspots
Next generation Wireless Local Area Networks (WLAN’s) are likely to require multihop wireless connections between mobile nodes and Internet gateways to achieve high data rates f...
Kuang-Ching Wang, Parameswaran Ramanathan