Sciweavers

6961 search results - page 1357 / 1393
» Domain-Oriented design Environments
Sort
View
SIGUCCS
2000
ACM
13 years 11 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
FAST
2010
13 years 10 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
MOBISYS
2010
ACM
13 years 10 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
MOBISYS
2010
ACM
13 years 10 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
AVI
2008
13 years 10 months ago
Time2Hide: spatial searches and clutter alleviation for the desktop
The desktop metaphor aimed to create a working environment, which would resemble that of the user's desk. With information abundance this desktop is often cluttered with file...
George Lepouras, Aggelos Papatriantafyllou, Akrivi...
« Prev « First page 1357 / 1393 Last » Next »