Sciweavers

276 search results - page 31 / 56
» A case for iconic icons
Sort
View
ICON
2007
IEEE
14 years 3 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
ICON
2007
IEEE
14 years 3 months ago
The Capacity of MIMO-based Wireless Mesh Networks
—Data transmission in wireless mesh networks (WMNs) has a multi-hop nature where data is originated/destinated to one source/sink node. Therefore, the transmission capacity at th...
Wael Jaafar, Wessam Ajib, Sami Tabbane
VISUALIZATION
2000
IEEE
14 years 1 months ago
A continuous clustering method for vector fields
A new method for the simplification of flow fields is presented. It is based on continuous clustering. A well-known physical clustering model, the Cahn Hillard model which desc...
Harald Garcke, Tobias Preußer, Martin Rumpf,...
ASSETS
2000
ACM
14 years 1 months ago
Low vision: the role of visual acuity in the efficiency of cursor movement
Graphical user interfaces are one of the more prevalent interface types which exist today. The popularity of this interface type has caused problems for users with poor vision. Be...
Julie A. Jacko, Armando Barreto, Gottlieb J. Marme...
TOOLS
1999
IEEE
14 years 1 months ago
Two-Level Modeling
Experience on a large banking application has highlighted expressive weaknesses in the standard (concrete) syntax of UML, resulting in models that are under-constrained. It es, ho...
Anthony Lauder, Stuart Kent