Sciweavers

8624 search results - page 1677 / 1725
» Designing example-critiquing interaction
Sort
View
SENSYS
2004
ACM
15 years 10 months ago
Mitigating congestion in wireless sensor networks
Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality t...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
SIGITE
2004
ACM
15 years 10 months ago
Keeping family of computing related disciplines together
There are efforts underway to define each of several flavors of computing disciplines, including computer science, computer engineering, information science, information technolog...
Reza Kamali, Lillian N. Cassel, Richard J. LeBlanc
SIGITE
2004
ACM
15 years 10 months ago
The use of MUPPETS in an introductory java programming course
“The Multi-User Programming Pedagogy for Enhancing Traditional Study” (MUPPETS) system has been under development at RIT for the last three years. This multi-user environment ...
Kevin J. Bierre, Andrew M. Phelps
ASWSD
2004
Springer
15 years 10 months ago
Simulink Integration of Giotto/TDL
The paper first presents the integration options of what we call the Timing Description Language (TDL) with MathWorks' Simulink tools. Based on the paradigm of logical executi...
Wolfgang Pree, Gerald Stieglbauer, Josef Templ
CCS
2004
ACM
15 years 10 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
« Prev « First page 1677 / 1725 Last » Next »