Sciweavers

5843 search results - page 1067 / 1169
» Software Security in Practice
Sort
View
SIGCOMM
2003
ACM
14 years 3 months ago
Scaling internet routers using optics
Routers built around a single-stage crossbar and a centralized scheduler do not scale, and (in practice) do not provide the throughput guarantees that network operators need to ma...
Isaac Keslassy, Shang-Tse Chuang, Kyoungsik Yu, Da...
ASSETS
2007
ACM
14 years 2 months ago
WebinSitu: a comparative analysis of blind and sighted browsing behavior
Web browsing is inefficient for blind web users because of persistent accessibility problems, but the extent of these problems and their practical effects from the perspective of ...
Jeffrey P. Bigham, Anna Cavender, Jeremy T. Brudvi...
ESCIENCE
2006
IEEE
14 years 1 months ago
ODIN: A Model for Adapting and Enriching Legacy Infrastructure
The Online Database of Interlinear Text (ODIN)1 is a database of interlinear text "snippets", harvested mostly from scholarly documents posted to the Web. Although large...
William D. Lewis
IE
2007
13 years 11 months ago
Through the looking glass: game worlds as representations and views from elsewhere
This paper describes the rationale and subsequent development stages of a work in progress: a graffiti toolkit for rich spatial 3D environments and an actual world mnemonic collec...
J. Turner, Nicola J. Bidwell
WSC
2000
13 years 11 months ago
An integrated object model for activity network based simulation
This paper describes an object-orientated simulation approach towards an integrated planning of production systems. The main obstacle for an integrated use of simulation over diff...
Gert Zülch, Jörg Fischer, Uwe Jonsson
« Prev « First page 1067 / 1169 Last » Next »