Sciweavers

582 search results - page 35 / 117
» Too Much Middleware
Sort
View
CHI
1999
ACM
14 years 11 days ago
Bridging Strategies for VR-Based Learning
A distributed immersive virtual environment was deployed as a component of a pedagogical strategy for teaching third grade children that the Earth is round. The displacement strat...
Thomas G. Moher, Andrew E. Johnson, Stellan Ohlsso...
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
14 years 9 days ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
RTSS
1996
IEEE
14 years 6 days ago
A multiframe model for real-time tasks
The well-known periodic task model of Liu and Layland 1] assumes a worst-case execution time bound for every task and may be too pessimistic if the worst-case execution time of a ...
Aloysius K. Mok, Deji Chen
ALDT
2009
Springer
126views Algorithms» more  ALDT 2009»
14 years 1 days ago
On Low-Envy Truthful Allocations
We study the problem of allocating a set of indivisible items to players having additive utility functions over the items. We consider allocations in which no player envies the bun...
Ioannis Caragiannis, Christos Kaklamanis, Panagiot...
ESA
2000
Springer
124views Algorithms» more  ESA 2000»
13 years 11 months ago
Higher Order Delaunay Triangulations
For a set P of points in the plane, we introduce a class of triangulations that is an extension of the Delaunay triangulation. Instead of requiring that for each triangle the circ...
Joachim Gudmundsson, Mikael Hammar, Marc J. van Kr...