Sciweavers

759 search results - page 117 / 152
» Control Component Development of Information Appliances on N...
Sort
View
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
15 years 6 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay
JAIR
2006
74views more  JAIR 2006»
14 years 11 months ago
Understanding Algorithm Performance on an Oversubscribed Scheduling Application
The best performing algorithms for a particular oversubscribed scheduling application, Air Force Satellite Control Network (AFSCN) scheduling, appear to have little in common. Yet...
Laura Barbulescu, Adele E. Howe, L. Darrell Whitle...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 5 months ago
Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Ralf Klischewski
VRML
1995
ACM
15 years 3 months ago
Internetwork Infrastructure Requirements for Virtual Environments
Virtual environments (VEs) are a broad multidisciplinary research area that includes all aspects of computer science, virtual reality, virtual worlds, teleoperation and telepresenc...
Donald P. Brutzman, Michael R. Macedonia, Michael ...
BROADNETS
2007
IEEE
15 years 6 months ago
Cross-layer optimization made practical
Abstract— Limited resources and time-varying nature of wireless ad hoc networks demand optimized use of resources across layers. Cross-layer optimization (CLO) for wireless netwo...
Ajit Warrier, Long Le, Injong Rhee