Sciweavers

4111 search results - page 756 / 823
» Designing the Human Computer Interaction: Trends and Challen...
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 8 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
83
Voted
SIGUCCS
2009
ACM
15 years 8 months ago
Getting iTunes U at Ithaca College up and running!
iTunes U is a free service from Apple that allows for the easy organization and distribution of content through iTunes. In the spring of 2008, Ithaca College signed a contract wit...
Beth M. Rugg
IEEESCC
2006
IEEE
15 years 7 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan
JCDL
2006
ACM
128views Education» more  JCDL 2006»
15 years 7 months ago
Building a research library for the history of the web
This paper describes the building of a research library for studying the Web, especially research on how the structure and content of the Web change over time. The library is part...
William Y. Arms, Selcuk Aya, Pavel Dmitriev, Blaze...
SEAAI
1998
Springer
15 years 5 months ago
On theoretical backgrounds of CAD
Abstract. In the past, some information technologies (IT) have quickly been adopted by the engineering practice while the implementation of others has been slower. In the paper, th...
Ziga Turk