Sciweavers

1027 search results - page 124 / 206
» Opening Up The Enterprise
Sort
View
VRCAI
2006
ACM
15 years 5 months ago
Advanced virtual reality technologies for surveillance and security applications
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tel...
Renaud Ott, Mario Gutiérrez, Daniel Thalman...
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
15 years 5 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai
ICW
2005
IEEE
178views Communications» more  ICW 2005»
15 years 5 months ago
Adding Multi-Class Routing into the DiffServ Architecture
- To alleviate the problem of high priority traffic hogging of all the available network capacity and to optimize the network traffic in the DiffServ network, we introduce the mult...
Yin Wang, Raimo Kantola, Shuping Liu
WCRE
2005
IEEE
15 years 5 months ago
Source versus Object Code Extraction for Recovering Software Architecture
The architecture of many large software systems is rarely documented and if documented it is usually out of date. To support developers maintaining and evolving these systems, an ...
Ahmed E. Hassan, Zhen Ming Jiang, Richard C. Holt
ITICSE
2005
ACM
15 years 5 months ago
eFuzion: development of a pervasive educational system
Established as a research project at the University of Illinois in the spring of 2002, eFuzion has proven to be a valuable and effective pedagogical set of tools. It provides the ...
Chad Peiper, David Warden, Ellick Chan, Boris Capi...