Sciweavers

1718 search results - page 334 / 344
» Mobile Music Making
Sort
View
ICSE
1997
IEEE-ACM
14 years 28 days ago
Prioritizing Software Requirements in an Industrial Setting
The planning of additional featuresand releases is a major concem for commercialsoftware companies. We describe how, in collaboration with Ericsson Radio Systems, we developed and...
Kevin Ryan, Joachim Karlsson
ACMACE
2007
ACM
14 years 24 days ago
How to build a hard-to-use mouse
Computer games do not afford much physical activity and hence do not require significant energy expenditure, which can contribute to the prevalence of a sedentary lifestyle. A &qu...
Florian Mueller
ICCD
2007
IEEE
195views Hardware» more  ICCD 2007»
14 years 19 days ago
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation
The emerging trend of larger number of cores or processors on a single chip in the server, desktop, and mobile notebook platforms necessarily demands larger amount of on-chip last...
Jugash Chandarlapati, Mainak Chaudhuri
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
14 years 15 days ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
ITS
2000
Springer
159views Multimedia» more  ITS 2000»
14 years 11 days ago
Can We Learn from ITSs?
With the rise of VR, the internet, and mobile technologies and the shifts in educational focus from teaching to learning and from solitary to collaborative work, it's easy (bu...
Benedict du Boulay