Sciweavers

26354 search results - page 5136 / 5271
» How we refactor, and how we know it
Sort
View
CE
2007
122views more  CE 2007»
15 years 1 months ago
Employing virtual humans for education and training in X3D/VRML worlds
Web-based education and training provides a new paradigm for imparting knowledge; students can access the learning material anytime by operating remotely from any location. Web3D ...
Lucio Ieronutti, Luca Chittaro
IEICET
2006
79views more  IEICET 2006»
15 years 1 months ago
System LSI: Challenges and Opportunities
End of CMOS scaling has been discussed in many places since the late 90's. Even if the end of CMOS scaling is irrelevant, it is for sure that we are facing a turning point in...
Tadahiro Kuroda
CN
2007
117views more  CN 2007»
15 years 1 months ago
Cellular universal IP for nested network mobility
In recent years, network mobility (NEMO) has been studied extensively due to its potential applications in military and public transportation. NEMO basic support protocol (NBSP), ...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
IJHPCN
2006
106views more  IJHPCN 2006»
15 years 1 months ago
Performance evaluation of the Sun Fire Link SMP clusters
As symmetric multiprocessors become commonplace, the interconnection networks and the communication system software in clusters of multiprocessors become critical to achieving high...
Ying Qian, Ahmad Afsahi, Nathan R. Fredrickson, Re...
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 1 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
« Prev « First page 5136 / 5271 Last » Next »