Sciweavers

1799 search results - page 225 / 360
» Design considerations for MRAM
Sort
View
ICSE
2004
IEEE-ACM
16 years 4 months ago
Unifying Artifacts and Activities in a Visual Tool for Distributed Software Development Teams
In large projects, software developers struggle with two sources of complexity ? the complexity of the code itself, and the complexity of the process of producing it. Both of thes...
Jon Froehlich, Paul Dourish
ICDE
2010
IEEE
292views Database» more  ICDE 2010»
16 years 4 months ago
Usher: Improving Data Quality With Dynamic Forms
Data quality is a critical problem in modern databases. Data entry forms present the first and arguably best opportunity for detecting and mitigating errors, but there has been li...
Kuang Chen, Harr Chen, Neil Conway, Joseph M. Hell...
PERCOM
2005
ACM
16 years 4 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
MOBISYS
2005
ACM
16 years 4 months ago
Deploying and evaluating a location-aware system
Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
Robert K. Harle, Andy Hopper
MOBIHOC
2006
ACM
16 years 4 months ago
An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces
Vehicular ad hoc networks (VANETs) using WLAN technology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since m...
Valery Naumov, Rainer Baumann, Thomas R. Gross