Sciweavers

61 search results - page 10 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
W4A
2009
ACM
14 years 2 months ago
Accessibility perspectives on enabling South African sign language in the South African national accessibility portal
Persons with disabilities are often marginalised from economy and society due to the lack of access to disability related information and services. Through the use of assistive te...
Louis Coetzee, Guillaume J.-L. Olivrin, Ilse Vivie...
WICSA
2004
13 years 8 months ago
Symphony: View-Driven Software Architecture Reconstruction
Authentic descriptions of a software architecture are required as a reliable foundation for any but trivial changes to a system. Far too often, architecture descriptions of existi...
Arie van Deursen, Christine Hofmeister, Rainer Kos...
CDC
2010
IEEE
115views Control Systems» more  CDC 2010»
13 years 2 months ago
Distributed statistical estimation of the number of nodes in sensor networks
The distributed estimation of the number of active sensors in a network can be important for estimation and organization purposes. We propose a design methodology based on the foll...
Damiano Varagnolo, Gianluigi Pillonetto, Luca Sche...
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
Automatic measurement of memory hierarchy parameters
The running time of many applications is dominated by the cost of memory operations. To optimize such applications for a given platform, it is necessary to have a detailed knowled...
Kamen Yotov, Keshav Pingali, Paul Stodghill
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 2 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky