Sciweavers

706 search results - page 128 / 142
» Clone-Aware Configuration Management
Sort
View
PERCOM
2004
ACM
14 years 10 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
14 years 5 months ago
Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - Benefits
Up to now, there has been little academic support for the challenges of IT governance/IT management. As a reaction, various best practice frameworks - like COBIT or CMMI - were de...
Matthias Goeken, Stefanie Alter
INTETAIN
2009
Springer
14 years 5 months ago
Accessible Gaming through Mainstreaming Kinetic Controller
Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be...
Yolanda Garrido, Álvaro Marco, Joaquí...
ICMCS
2008
IEEE
144views Multimedia» more  ICMCS 2008»
14 years 4 months ago
Enabling access to sound archives through integration, enrichment and retrieval
Many digital sound archives still suffer from tremendous problems concerning access. Materials are often in different formats, with related media in separate collections, and with...
Ivan Damnjanovic, Josh Reiss, Dan Barry
DATE
2007
IEEE
81views Hardware» more  DATE 2007»
14 years 4 months ago
Improving utilization of reconfigurable resources using two dimensional compaction
Partial reconfiguration allows parts of the reconfigurable chip area to be configured without affecting the rest of the chip. This allows placement of tasks at run time on the rec...
Ahmed A. El Farag, Hatem M. El-Boghdadi, Samir I. ...