Sciweavers

647 search results - page 11 / 130
» Technical method of Zoetmorerope
Sort
View
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
14 years 1 months ago
Multi-Method Approaches to Digital Government Research: Value Lessons and Implementation Challenges
Digital government is a complex organizational and social phenomenon. It involves technical, organizational, and policy elements, as well as their complex and recursive interactio...
José Ramón Gil-García, Theres...
ITICSE
1999
ACM
13 years 11 months ago
Laboratory experiment with the 3RolesPlaying method
The paper addressesthe problem of making experiments for software engineering during laboratories. There is a need for experimental investigations. If experiments are performed in...
Anna E. Bobkowska
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Mobility Management for Untethered Immersive Communications
In this paper we propose a system design for delivery of immersive communications to mobile wireless devices based on a distributed proxy model. It is demonstrated that this archi...
Mehran Dowlatshahi, Farzad Safaei
ANSOFT
1998
140views more  ANSOFT 1998»
13 years 7 months ago
FORM: A Feature-Oriented Reuse Method with Domain-Specific Reference Architectures
Systematic discovery and exploitation of commonality across related software systems is a fundamental technical requirement for achieving successful software reuse. By examining a...
Kyo Chul Kang, Sajoong Kim, Jaejoon Lee, Kijoo Kim...
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 1 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine