Sciweavers

11665 search results - page 2193 / 2333
» Human computing for EDA
Sort
View
CANDC
2005
ACM
14 years 12 months ago
The development of a cybernetic sculptor: Edward Ihnatowicz and the senster
Edward Ihnatowicz (1926-1988) built one of the world’s first computer-controlled robotic sculptures, The Senster, in 196870. Rather than concentrate entirely on this groundbreak...
Aleksandar Zivanovic
CSCW
2008
ACM
14 years 11 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
DCOSS
2008
Springer
14 years 11 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
IE
2007
14 years 11 months ago
Speaking in character: using voice-over-IP to communicate within MMORPGs
While voice-over-IP has long been favoured as a communication medium by players of team-based online shooter games, it has recently also been appropriated by players of MMORPGs, a...
Greg Wadley, Martin R. Gibbs, Peter Benda
DFN
2003
14 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
« Prev « First page 2193 / 2333 Last » Next »