Sciweavers

1931 search results - page 354 / 387
» Why we blog
Sort
View
VRML
2003
ACM
14 years 3 months ago
Binary compression rates for ASCII formats
Geometry compression for VRML has been an important item on the wish-list of the Web3D Consortium since 1996. It was widely understood that a binary format would be required to al...
Martin Isenburg, Jack Snoeyink
WS
2003
ACM
14 years 3 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
COMPSAC
2002
IEEE
14 years 2 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
HICSS
2002
IEEE
151views Biometrics» more  HICSS 2002»
14 years 2 months ago
The Study of Information System Development (ISD) Process from the Perspectives of Power Development Stage and Organizational Po
This paper is to study the information system development (ISD) by looking into fifty-six cases from the perspectives of power development stage and organizational politics. We in...
Ling-hsing Chang, Tung-Ching Lin, Sheng Wu
GROUP
2009
ACM
14 years 2 months ago
Musical fingerprints: collaboration around home media collections
As people collect more and more digital music, photos, and video, the growing scale of the collection challenges how families share and collaborate around home media collections. ...
Robin Sease, David W. McDonald