Sciweavers

6768 search results - page 1255 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 9 months ago
The Visual Wiki: A New Metaphor for Knowledge Access and Management
Successful knowledge management results in a competitive advantage in today’s information- and knowledge-rich industries. The elaboration and integration of emerging web-based t...
Christian Hirsch, John G. Hosking, John C. Grundy,...
ICNP
2009
IEEE
15 years 9 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
INFOCOM
2009
IEEE
15 years 9 months ago
Cross-Layer Survivability in WDM-Based Networks
—In layered networks, a single failure at a lower layer may cause multiple failures in the upper layers. As a result, traditional schemes that protect against single failures may...
Kyunghan Lee, Eytan Modiano
MHCI
2009
Springer
15 years 9 months ago
Studying multi-user settings for pervasive games
Whenever a pervasive game has to be developed for a group of children an appropriate multi-user setting has to be found. If the pervasive game does not support the children with a...
Karin Leichtenstern, Elisabeth André
ITICSE
2009
ACM
15 years 9 months ago
Hybrid and custom data structures: evolution of the data structures course
The topic of data structures has historically been taught with two major focuses: first, the basic definition and implementation of a small set of basic data structures (e.g. list...
Daniel J. Ernst, Daniel E. Stevenson, Paul J. Wagn...
« Prev « First page 1255 / 1354 Last » Next »