Sciweavers

1767 search results - page 119 / 354
» Open Source Ecology
Sort
View
IM
2003
13 years 9 months ago
Enabling PreOS Desktop Management
: Desktop management is probably the most resource-consuming task for the typical operations and support team, regardless of being frequently overlooked as not as complex or specia...
Tiago Cruz, Paulo Simões
VR
2010
IEEE
200views Virtual Reality» more  VR 2010»
13 years 6 months ago
Mixed reality in virtual world teleconferencing
In this paper we present a Mixed Reality (MR) teleconferencing application based on Second Life (SL) and the OpenSim virtual world. Augmented Reality (AR) techniques are used for ...
Tuomas Kantonen, Charles Woodward, Neil Katz
MSR
2006
ACM
14 years 2 months ago
Are refactorings less error-prone than other changes?
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Peter Weißgerber, Stephan Diehl
IWIA
2003
IEEE
14 years 1 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 5 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri