Sciweavers

5075 search results - page 954 / 1015
» Interaction Design for the Disappearing Computer
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 5 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CORR
2011
Springer
147views Education» more  CORR 2011»
13 years 2 months ago
Human-Assisted Graph Search: It's Okay to Ask Questions
We consider the problem of human-assisted graph search: given a directed acyclic graph with some (unknown) target node(s), we consider the problem of finding the target node(s) b...
Aditya G. Parameswaran, Anish Das Sarma, Hector Ga...
CSCW
2011
ACM
13 years 2 months ago
Me and my avatar: exploring users' comfort with avatars for workplace communication
This paper describes results from a large-scale survey to explore users’ comfort with different styles of avatars for workplace communication. Thirty-one avatars were evaluated ...
Kori M. Inkpen, Mara Sedlins
ICONFERENCE
2011
13 years 2 months ago
Infrastructures to imagine: the Mexican internet industry
The Internet provides a technical platform that can be used by start-ups in every country to launch innovative products for world markets. Yet, most of the successful Internet pro...
Ruy Cervantes
TCAD
2010
168views more  TCAD 2010»
13 years 2 months ago
An MILP-Based Performance Analysis Technique for Non-Preemptive Multitasking MPSoC
For real-time applications, it is necessary to estimate the worst-case performance early in the design process without actual hardware implementation. While the non-preemptive task...
Hoeseok Yang, Sungchan Kim, Soonhoi Ha