Sciweavers

2537 search results - page 106 / 508
» How to draw a group
Sort
View
CHI
2004
ACM
14 years 9 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
14 years 2 months ago
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
ISESE
2003
IEEE
14 years 2 months ago
An experiment on software project size and effort estimation
Expert judgement is still the dominant technique in practice today for estimation of software project size and effort. In this paper, two instruments are evaluated that have been ...
Ursula Passing, Martin J. Shepperd
ICDCS
2002
IEEE
14 years 1 months ago
Key Trees and the Security of Interval Multicast
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys i...
Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
ETS
2000
IEEE
154views Hardware» more  ETS 2000»
13 years 8 months ago
Task Structuring for On-line Problem Based Learning: A Case Study
Getting students to collaborate on group projects in a face-to-face scenario can be difficult enough -- but how does one approach collaborative projects in a Web-based environment...
Vanessa Paz Dennen