Sciweavers

2015 search results - page 143 / 403
» Hidden Software Capabilities
Sort
View
APVIS
2003
13 years 11 months ago
A Unified Taxonomic Framework for Information Visualization
© We present a taxonomy for Information Visualization (IV) that characterizes it in terms of data, task, skill and context, as well as a number of dimensions that relate to the in...
Darius Pfitzner, Vaughan Hobbs, David M. W. Powers
SEC
2004
13 years 11 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
DSS
2007
65views more  DSS 2007»
13 years 9 months ago
Using Web Services for supporting the users of wireless devices
The Web Service paradigm is currently considered as the most promising and rapidly evolving technology for developing applications in open, distributed and heterogeneous environme...
Thomi Pilioura, Stathes Hadjiefthymiades, Aphrodit...
CSCW
2002
ACM
13 years 9 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager
HOTNETS
2010
13 years 4 months ago
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...