Sciweavers

663 search results - page 93 / 133
» What Is a Concept
Sort
View
SETP
2007
13 years 11 months ago
Dimensional Inference Using Symbol Lives
Scientific equations embedded in computer programs must obey the rules for dimensional consistency. Many efforts have been made to enforce these rules within computer programs. So...
Brian Farrimond, John Collins
AVI
2004
13 years 11 months ago
Scaffolding visually cluttered web pages to facilitate accessibility
Increasingly, rich and dynamic content and abundant links are making Web pages visually cluttered and widening the accessibility divide for the disabled and people with impairment...
Alison Lee
ECIS
2004
13 years 11 months ago
Deriving business value from IT: converting IT expenditures into assets with desired impacts
The research reported in this paper examines how business value is being created and delivered by IT in large private organisations in Australia. The critical organisational gover...
Judy McKay, Peter Marshall
ERSA
2006
102views Hardware» more  ERSA 2006»
13 years 11 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
IADIS
2004
13 years 11 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu