Sciweavers

548 search results - page 90 / 110
» Computation of Shape Through Controlled Active Exploration
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Realization of virtual networks in the DECOS integrated architecture
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
Roman Obermaisser, Philipp Peti
CE
2004
128views more  CE 2004»
13 years 7 months ago
The role of educational software as a support for teaching and learning conversations
: Much recent educational research focuses on teaching and learning within classroom conversations. This raises the question of the role of ICT as a support for such conversations....
Rupert Wegerif
CHI
2011
ACM
12 years 11 months ago
Evaluating video visualizations of human behavior
Previously, we presented Viz-A-Vis, a VIsualiZation of Activity through computer VISion [17]. Viz-A-Vis visualizes behavior as aggregate motion over observation space. In this pap...
Mario Romero, Alice Vialard, John Peponis, John T....
SAC
2002
ACM
13 years 7 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
ISPA
2005
Springer
14 years 1 months ago
Ethernet as a Lossless Deadlock Free System Area Network
The way conventional Ethernet is used today differs in two aspects from how dedicated system area networks are used. Firstly, dedicated system area networks are lossless and only d...
Sven-Arne Reinemo, Tor Skeie