Sciweavers

647 search results - page 9 / 130
» Technical method of Zoetmorerope
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
WECWIS
2006
IEEE
150views ECommerce» more  WECWIS 2006»
14 years 1 months ago
Economic Evaluation Framework of Resource Allocation Methods in Service-Oriented Architectures
Economic resource allocation in Application Layer Networks (such as Grids) is critical to allow applications and users to effectively exploit computational and data infrastructure...
Werner Streitberger, Michael Reinicke, Torsten Eym...
ITS
2004
Springer
103views Multimedia» more  ITS 2004»
14 years 26 days ago
RMT: A Dialog-Based Research Methods Tutor With or Without a Head
RMT (Research Methods Tutor) is a dialog-based tutoring system that has a dual role. Its modular architecture enables the interchange and evaluation of different tools and techniq...
Peter M. Wiemer-Hastings, David Allbritton, Elizab...
COMPSAC
2002
IEEE
14 years 13 days ago
Renaissance: A Method to Support Software System Evolution
Legacy systems are often business critical and are associated with high maintenance costs. In this paper, we present an overview of a method, Renaissance, which aims to manage the...
Ian Warren, Jane Ransom
ICMCS
1999
IEEE
131views Multimedia» more  ICMCS 1999»
13 years 11 months ago
A Method for Evaluating Multimedia Learning Software
We submit a method (EMPI: Evaluation of Multimedia, Pedagogical and Interactive software) to evaluate multimedia software used in educational context. Our purpose is to help users...
Stéphane Crozat, Olivier Hû, Philippe...