Sciweavers

2169 search results - page 335 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
169
Voted
MOBIHOC
2005
ACM
16 years 4 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
SYSTOR
2009
ACM
15 years 11 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
JCDL
2005
ACM
100views Education» more  JCDL 2005»
15 years 10 months ago
What's there and what's not?: focused crawling for missing documents in digital libraries
Some large scale topical digital libraries, such as CiteSeer, harvest online academic documents by crawling open-access archives, university and author homepages, and authors’ s...
Ziming Zhuang, Rohit Wagle, C. Lee Giles
139
Voted

Publication
104views
16 years 6 months ago
Examining travel distances by walking and cycling, Montréal, Canada
Active transportation – especially walking and cycling – is undergoing a surge in popularity in urban planning and transportation circles as a solution to the environmental and...
Yasmin, F., Larsen, J. & El-Geneidy, A.
BCSHCI
2007
15 years 6 months ago
Voice art: investigating paralinguistic voice as a mode of interaction to create visual art
In this paper, we report on our investigation into people’s ability to use the volume of their voice to control cursor movement to create drawings. Early analysis of the results...
Dharani Priyahansika Perera, R. T. Jim Eales, Kath...