Sciweavers

2015 search results - page 143 / 403
» Hidden Software Capabilities
Sort
View
APVIS
2003
15 years 2 months ago
A Unified Taxonomic Framework for Information Visualization
© We present a taxonomy for Information Visualization (IV) that characterizes it in terms of data, task, skill and context, as well as a number of dimensions that relate to the in...
Darius Pfitzner, Vaughan Hobbs, David M. W. Powers
SEC
2004
15 years 2 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
97
Voted
DSS
2007
65views more  DSS 2007»
15 years 22 days ago
Using Web Services for supporting the users of wireless devices
The Web Service paradigm is currently considered as the most promising and rapidly evolving technology for developing applications in open, distributed and heterogeneous environme...
Thomi Pilioura, Stathes Hadjiefthymiades, Aphrodit...
93
Voted
CSCW
2002
ACM
15 years 18 days ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager
HOTNETS
2010
14 years 7 months ago
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...