Sciweavers

7426 search results - page 1301 / 1486
» The LHC Computing Challenge
Sort
View
115
Voted
ASSETS
2006
ACM
15 years 11 months ago
The vocal joystick: : evaluation of voice-based cursor control techniques
Mouse control has become a crucial aspect of many modern day computer interactions. This poses a challenge for individuals with motor impairments or those whose use of hands are r...
Susumu Harada, James A. Landay, Jonathan Malkin, X...
CSCW
2006
ACM
15 years 11 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson
DIM
2006
ACM
15 years 11 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IMC
2006
ACM
15 years 11 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
141
Voted
IWCMC
2006
ACM
15 years 11 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
« Prev « First page 1301 / 1486 Last » Next »