Sciweavers

26354 search results - page 5080 / 5271
» How we refactor, and how we know it
Sort
View
142
Voted
ICCS
2005
Springer
15 years 7 months ago
Games of Inquiry for Collaborative Concept Structuring
Google’s project to digitize five of the world's greatest libraries will dramatically extend their search engine reach in the future. Current search-engine philosophy, which...
Mary A. Keeler, Heather D. Pfeiffer
115
Voted
ICMI
2005
Springer
162views Biometrics» more  ICMI 2005»
15 years 7 months ago
Distributed pointing for multimodal collaboration over sketched diagrams
A problem faced by groups that are not co-located but need to collaborate on a common task is the reduced access to the rich multimodal communicative context that they would have ...
Paulo Barthelmess, Edward C. Kaiser, Xiao Huang, D...
IWQOS
2005
Springer
15 years 7 months ago
Processor Sharing Flows in the Internet
Most congestion control algorithms try to emulate processor sharing (PS) by giving each competing flow an equal share of a bottleneck link. This approach leads to fairness, and pr...
Nandita Dukkipati, Masayoshi Kobayashi, Rui Zhang-...
109
Voted
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
15 years 7 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
SAFECOMP
2005
Springer
15 years 7 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
« Prev « First page 5080 / 5271 Last » Next »