Sciweavers

5843 search results - page 1052 / 1169
» Software Security in Practice
Sort
View
ICAD
2004
13 years 11 months ago
Capture and Recreation of Higher-Order 3D Sound Fields via Reciprocity
We propose a unified and simple approach for capturing and recreating 3D sound fields by exploring the reciprocity principle that is satisfied between the two processes. Our appro...
Zhiyun Li, Ramani Duraiswami, Nail A. Gumerov
ACE
2003
120views Education» more  ACE 2003»
13 years 11 months ago
Online Assessment of SQL Query Formulation Skills
Being able to formulate useful SQL queries is a fundamental skill required by many software development professionals. Mastering this skill is a difficult process, requiring consi...
Julia Coleman Prior
APPINF
2003
13 years 11 months ago
Requirement Indicators for Mobile Work: The MOWAHS Approach
This paper describes eight requirement indicators derived from a mobile work characterisation framework (MWCF). The MWCF is a framework for analysing mobile scenarios (mobile task...
Heri Ramampiaro, Alf Inge Wang, Carl-Fredrik S&osl...
ECSCW
2001
13 years 11 months ago
On finding things out: Situating organisational knowledge in CSCW
We present a field study of an organisation which designs and constructs precision mechatronic devices, which typically integrate electronics, mechanical assemblies, computer hardw...
Kristina Groth, John Bowers
PDCN
2004
13 years 11 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
« Prev « First page 1052 / 1169 Last » Next »