Sciweavers

1147 search results - page 148 / 230
» Transformation of Access Rights
Sort
View
IJMMS
2008
68views more  IJMMS 2008»
13 years 9 months ago
Mobile technologies in mobile spaces: Findings from the context of train travel
Whilst mobile work is increasingly prevalent, there is little detailed study of this phenomenon in the specific context of a train. Thus, the current study focuses on how mobile w...
Carolyn M. Axtell, Donald Hislop, Steve Whittaker
CG
2007
Springer
13 years 9 months ago
Storylines: Visual exploration and analysis in latent semantic spaces
Tasks in visual analytics differ from typical information retrieval tasks in fundamental ways. A critical part of a visual analytics is to ask the right questions when dealing wit...
Weizhong Zhu, Chaomei Chen
CN
2007
80views more  CN 2007»
13 years 9 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
IS
2008
13 years 9 months ago
Efficient memory representation of XML document trees
Implementations that load XML documents and give access to them via, e.g., the DOM, suffer from huge memory demands: the space needed to load an XML document is usually many times...
Giorgio Busatto, Markus Lohrey, Sebastian Maneth
COMGEO
2007
ACM
13 years 9 months ago
A package for exact kinetic data structures and sweepline algorithms
In this paper we present a package for implementing exact kinetic data structures built on objects which move along polynomial trajectories. We discuss how the package design was ...
Daniel Russel, Menelaos I. Karavelas, Leonidas J. ...