Sciweavers

12568 search results - page 2339 / 2514
» Selective user interaction
Sort
View
125
Voted
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 1 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
106
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 1 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
108
Voted
IEEECIT
2010
IEEE
15 years 1 months ago
Decompression Method for Massive Compressed Files in Mobile Rich Media Applications
Aiming at the characteristics of mobile terminal equipments, the program of decompressing massive compressed files in mobile rich media applications is investigated in this paper....
Houchen Li, Zhijie Qiu, Lei Luo
IJHCI
2010
110views more  IJHCI 2010»
15 years 1 months ago
Images of Usability
The term usability is ubiquitous in human-computer interaction, so much so that it is commonly used without definition. Rather than one established meaning of usability, there are,...
Morten Hertzum
115
Voted
ISVC
2010
Springer
15 years 1 months ago
Computer-Generated Tie-Dyeing Using a 3D Diffusion Graph
Abstract. Hand dyeing generates artistic representations with unique and complex patterns. The aesthetics of dyed patterns on a cloth originate from the physical properties of dyei...
Yuki Morimoto, Kenji Ono
« Prev « First page 2339 / 2514 Last » Next »