Sciweavers

11061 search results - page 2066 / 2213
» Computer Architecture
Sort
View
VISUALIZATION
2005
IEEE
15 years 3 months ago
Volume rendering of smoke propagation CFD data
The evacuation of buildings in the event of a fire requires careful planning of ventilation and evacuation routes during early architectural design stages. Different designs are ...
Oliver Staubli, Christian Sigg, Ronald Peikert, Ma...
DIM
2007
ACM
15 years 2 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
WWW
2009
ACM
15 years 10 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
ACMICEC
2004
ACM
106views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
Measuring e-government impact: existing practices and shortcomings
Public administrations of all over the world invest an enormous amount of resources in e-government. How the success of egovernment can be measured is often not clear. E-governmen...
Rob M. Peters, Marijn Janssen, Tom M. van Engers
MOBIHOC
2002
ACM
15 years 9 months ago
Message-optimal connected dominating sets in mobile ad hoc networks
A connected dominating set (CDS) for a graph G(V, E) is a subset V of V , such that each node in V - V is adjacent to some node in V , and V induces a connected subgraph. A CDS ha...
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
« Prev « First page 2066 / 2213 Last » Next »