Sciweavers

7366 search results - page 1371 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
WWW
2002
ACM
16 years 4 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
CHI
2010
ACM
15 years 11 months ago
Let's play chinese characters: mobile learning approaches via culturally inspired group games
In many developing countries such as India and China, low educational levels often hinder economic empowerment. In this paper, we argue that mobile learning games can play an impo...
Feng Tian, Fei Lv, Jingtao Wang, Hongan Wang, Wenc...
SENSYS
2006
ACM
15 years 10 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi
SAC
2011
ACM
14 years 7 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
PODS
2005
ACM
136views Database» more  PODS 2005»
16 years 4 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
« Prev « First page 1371 / 1474 Last » Next »