Sciweavers

1776 search results - page 336 / 356
» Informational cascades in IT adoption
Sort
View
GROUP
2007
ACM
14 years 1 months ago
Beyond the lan: techniques from network games for improving groupware performance
Networked games can provide groupware developers with important lessons in how to deal with real-world networking issues such as latency, limited bandwidth and packet loss. Games ...
Jeff Dyck, Carl Gutwin, T. C. Nicholas Graham, Dav...
GLOBECOM
2009
IEEE
14 years 1 months ago
Multi-User Cooperative Communications with Relay-Coding for Uplink IMT-Advanced 4G Systems
Adoption of relay stations has been commonly accepted as a key technique for future IMTadvanced 4G systems to improve the link performance. While study in relay systems is often c...
Lei Cao, Jinyun Zhang, Norio Kanno
ATAL
2006
Springer
14 years 1 months ago
Awareness as a vital ingredient of teamwork
For successful coordination and cooperation in a multiagent system, participants need to establish a sufficiently accurate awareness of the current situation. Awareness is underst...
Barbara Dunin-Keplicz, Rineke Verbrugge
CCS
2006
ACM
14 years 1 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
DSN
2004
IEEE
14 years 1 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...