Sciweavers

420 search results - page 77 / 84
» An investigation into the use of field methods in the design...
Sort
View
WSNA
2003
ACM
14 years 28 days ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
ICADL
2005
Springer
137views Education» more  ICADL 2005»
14 years 1 months ago
A Collaborative Filtering Based Re-ranking Strategy for Search in Digital Libraries
Users of a digital book library system typically interact with the system to search for books by querying on the metadata describing the books or to search for information in the p...
U. Rohini, Vamshi Ambati
KBSE
2000
IEEE
14 years 2 days ago
A Comparison of Questionnaire-Based and GUI-Based Requirements Gathering
: Software development includes gathering information about tasks, work practices and design options from users. Traditionally requirements gathering takes two forms. Interviews an...
J. Michael Moore, Frank M. Shipman III
MOBIHOC
2008
ACM
14 years 7 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
OSDI
1994
ACM
13 years 9 months ago
Storage Alternatives for Mobile Computers
Mobile computers such as notebooks, subnotebooks, and palmtops require low weight, low power consumption, and good interactive performance. These requirements impose many challeng...
Fred Douglis, Ramón Cáceres, M. Fran...