Sciweavers

17505 search results - page 3355 / 3501
» Use Cases as Workflows
Sort
View
DIGRA
2005
Springer
15 years 10 months ago
Theory as Game: Designing the Game Game
Is there a way to analyze games by the means of a game? Is there a way to brainstorm game ideas and design solutions through theory? Finnish scholar and game designer Aki Järvine...
Aki Järvinen
120
Voted
ACMSE
2004
ACM
15 years 10 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
15 years 10 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
143
Voted
HT
2004
ACM
15 years 10 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
161
Voted
ISPD
2004
ACM
146views Hardware» more  ISPD 2004»
15 years 10 months ago
Power-aware clock tree planning
Modern processors and SoCs require the adoption of poweroriented design styles, due to the implications that power consumption may have on reliability, cost and manufacturability ...
Monica Donno, Enrico Macii, Luca Mazzoni
« Prev « First page 3355 / 3501 Last » Next »