Sciweavers

1328 search results - page 138 / 266
» Design Patterns for Modelling Guidelines
Sort
View
SOUPS
2009
ACM
14 years 4 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
RECSYS
2010
ACM
13 years 10 months ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu
HVEI
2009
13 years 8 months ago
A perceptual evaluation of 3D unsharp masking
Much research has gone into developing methods for enhancing the contrast of displayed 3D scenes. In the current study, we investigated the perceptual impact of an algorithm recen...
Matthias Ihrke, Tobias Ritschel, Kaleigh Smith, Th...
JSAC
2011
219views more  JSAC 2011»
13 years 5 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
GI
2005
Springer
14 years 3 months ago
Analysis and Design Techniques for Service-Oriented Development and Integration
: Service-Oriented Architectures (SOAs) have been established as an IT strategy to support the on demand goal of business agility. Web services standards and their implementations ...
Olaf Zimmermann, Niklas Schlimm, Günter Walle...