Sciweavers

8627 search results - page 1698 / 1726
» Software Engineering Using RATionale
Sort
View
88
Voted
TAPOS
1998
93views more  TAPOS 1998»
14 years 10 months ago
Object Acquaintance Selection and Binding
Large object-oriented systems have, at least, four characteristics that complicate object communication, i.e the system is distributed and contains large numbers, e.g. thousands, ...
Jan Bosch
93
Voted
WINET
2002
169views more  WINET 2002»
14 years 10 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
122
Voted
SIGDOC
2010
ACM
14 years 8 months ago
Musical interaction patterns: communicating computer music knowledge in a multidisciplinary project
The growing popularity of mobile devices gave birth to a still emergent research field, called Mobile Music, and concerning the development of musical applications for use in thes...
Luciano Vargas Flores, Evandro Manara Miletto, Mar...
CLEF
2009
Springer
14 years 8 months ago
Clustering for Text and Image-Based Photo Retrieval at CLEF 2009
For this year's Image CLEF Photo Retrieval task, we have prepared 5 submission runs to help us assess the effectiveness of 1) image content-based retrieval, and 2) textbased ...
Qian Zhu, Diana Inkpen
CCS
2010
ACM
14 years 7 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 1698 / 1726 Last » Next »