Sciweavers

268 search results - page 35 / 54
» Creating persuasive technologies: an eight-step design proce...
Sort
View
ISSA
2008
13 years 10 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
INTEGRATION
2000
71views more  INTEGRATION 2000»
13 years 8 months ago
A hardware implementation of realloc function
The memory intensive nature of object-oriented languages such as C++ and Java has created the need of a high-performance dynamic memory management. Objectoriented applications oft...
Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chan...
CGF
1998
116views more  CGF 1998»
13 years 8 months ago
Importance Driven Texture Coordinate Optimization
Traditionally, texture coordinates have been generated based solely on the model’s geometry, often even before a model’s textures have been created. With the arrival of new te...
Peter-Pike J. Sloan, David M. Weinstein, J. Dean B...
PERCOM
2010
ACM
13 years 6 months ago
Towards ontology-driven development of applications for smart environments
—In the environments where heterogeneous devices need to share information, utilize services of each other, and participate as components in various smart applications, it is com...
Artem Katasonov, Marko Palviainen
HCI
2009
13 years 6 months ago
Augmenting Sticky Notes as an I/O Interface
The design and implementation of systems that combine both the utilities of the digital world as well as intrinsic affordances of traditional artifacts are challenging. In this pap...
Pranav Mistry, Pattie Maes