Sciweavers

7430 search results - page 1302 / 1486
» Programming Applications in CIFF
Sort
View
SENSYS
2005
ACM
15 years 9 months ago
Algorithms for generic role assignment in wireless sensor networks
We consider configuration of wireless sensor networks, where certain functions must be automatically assigned to sensor nodes, such that the properties of a sensor node (e.g., rem...
Christian Frank, Kay Römer
SIGITE
2005
ACM
15 years 9 months ago
Towards using online portfolios in computing courses
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...
Bryan Higgs, Mihaela Sabin
UIST
2005
ACM
15 years 9 months ago
Metisse is not a 3D desktop!
Twenty years after the general adoption of overlapping windows and the desktop metaphor, modern window systems differ mainly in minor details such as window decorations or mouse a...
Olivier Chapuis, Nicolas Roussel
UIST
2005
ACM
15 years 9 months ago
Artistic resizing: a technique for rich scale-sensitive vector graphics
When involved in the visual design of graphical user interfaces, graphic designers can do more than providing static graphics for programmers to incorporate into applications. We ...
Pierre Dragicevic, Stéphane Chatty, David T...
VEE
2005
ACM
203views Virtualization» more  VEE 2005»
15 years 9 months ago
Inlining java native calls at runtime
We introduce a strategy for inlining native functions into JavaTM applications using a JIT compiler. We perform further optimizations to transform inlined callbacks into semantica...
Levon Stepanian, Angela Demke Brown, Allan Kielstr...
« Prev « First page 1302 / 1486 Last » Next »