Sciweavers

1898 search results - page 200 / 380
» Weak Keys for IDEA
Sort
View
194
Voted
MIXER
2004
15 years 5 months ago
FixIt: An Approach towards Assisting Workers in Diagnosing Machine Malfunctions
Augmented Reality (AR) is a newly emerging user interface paradigm that is currently under rapid development. AR is still in its infancy. Only very few cases exist, in which AR te...
Gudrun Klinker, Hesam Najafi, Tobias Sielhorst, Fa...
152
Voted
SBBD
2004
166views Database» more  SBBD 2004»
15 years 5 months ago
An Apriori-based Approach for First-Order Temporal Pattern Mining
Previous studies on mining sequential patterns have focused on temporal patterns specified by some form of propositional temporal logic. However, there are some interesting sequen...
Sandra de Amo, Daniel A. Furtado, Arnaud Giacomett...
118
Voted
WSC
2001
15 years 5 months ago
An agent architecture for implementing command and control in military simulations
In models of military operations it is important to include the Command and Control (C2) process in order to achieve a realistic simulation of a military force's behaviour an...
Colin R. Mason, James Moffat
129
Voted
ICECCS
2010
IEEE
158views Hardware» more  ICECCS 2010»
15 years 3 months ago
A Network Analysis of Stakeholders in Tool Visioning Process for Story Test Driven Development
Participation from all stakeholders is important in a successful software development project, especially if the development project is complex and has many stakeholders. Identify...
Shelly Park, Frank Maurer
122
Voted
CORR
2010
Springer
60views Education» more  CORR 2010»
15 years 3 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal