Sciweavers

231 search results - page 37 / 47
» Modeling the User Acceptance of E-Mail
Sort
View
CHI
2004
ACM
14 years 11 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
EUROSYS
2007
ACM
14 years 8 months ago
STMBench7: a benchmark for software transactional memory
Software transactional memory (STM) is a promising technique for controlling concurrency in modern multi-processor architectures. STM aims to be more scalable than explicit coarse...
Rachid Guerraoui, Michal Kapalka, Jan Vitek
ICNS
2008
IEEE
14 years 5 months ago
DiProNN: Distributed Programmable Network Node Architecture
The programmable network approach allows processing of passing user data in a network, which is highly suitable especially for multimedia streams processing. However, programming ...
Tomás Rebok
IPPS
2006
IEEE
14 years 4 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
ACCV
2006
Springer
14 years 4 months ago
Vision-Based Posing of 3D Virtual Actors
Construction of key poses is one of the most tedious and time consuming steps in synthesizing of 3D virtual actors. Recent alternate schemes expect the user to specify two inputs. ...
Ameya S. Vaidya, Appu Shaji, Sharat Chandran