Sciweavers

12289 search results - page 219 / 2458
» computing 2006
Sort
View
127
Voted
PUC
2007
113views more  PUC 2007»
15 years 3 months ago
Yesterday's tomorrows: notes on ubiquitous computing's dominant vision
Ubiquitous computing is unusual amongst technological research arenas. Most areas of computer science research, such as programming language implementation, distributed operating s...
Genevieve Bell, Paul Dourish
128
Voted
IPL
1998
89views more  IPL 1998»
15 years 3 months ago
A Limitation of Vector Timestamps for Reconstructing Distributed Computations
Vector timestamps provide a way of recording the causal relationships between events in a distributed computation. We draw attention to a limitation of such timestamps when used t...
Colin J. Fidge
117
Voted
EJIS
2006
108views more  EJIS 2006»
15 years 3 months ago
New frontiers for information systems research: computer art as an information system
This paper proposes extending the frontiers of information systems (IS) research by seeing computer art as a kind of information system. It explores some research questions that a...
Briony J. Oates
149
Voted
PRL
2006
132views more  PRL 2006»
15 years 3 months ago
Modelling and accuracy estimation of a new omnidirectional depth computation sensor
Depth computation is an attractive feature in computer vision. The use of traditional perspective cameras for panoramic perception requires several images, most likely implying th...
Radu Orghidan, Joaquim Salvi, El Mustapha Mouaddib
129
Voted
JCS
2010
112views more  JCS 2010»
15 years 2 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...