Sciweavers

3865 search results - page 74 / 773
» Active memory operations
Sort
View
ICSE
2009
IEEE-ACM
16 years 5 months ago
Learning operational requirements from goal models
Goal-oriented methods have increasingly been recognised as an effective means for eliciting, elaborating, analysing and specifying software requirements. A key activity in these a...
Alessandra Russo, Dalal Alrajeh, Jeff Kramer, Seba...
CHI
2006
ACM
16 years 5 months ago
Design of a role-playing game to study the trajectories of health care workers in an operating room
Drawing on an ethnographic study of hospital work in an operating room, we present the design and implementation of a web-based role-playing application of a master schedule. We s...
Elisa Mattarelli, Kelly J. Fadel, Suzanne P. Weisb...
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 11 months ago
A Distributed Approach to Interference Mitigation Between OFDM-Based 802.16 Systems Operating in License-Exempt Spectrum
— An approach to mitigating interference between 802.16 license-exempt systems is proposed in this paper. More specifically, the approach focuses on solving problems which arise...
Omar Ashagi, Seán Murphy, Liam Murphy
HICSS
1996
IEEE
136views Biometrics» more  HICSS 1996»
15 years 8 months ago
Design of a Real-Time Co-Operating System for Multiprocessor Workstations
: We have designed a Real-Time Co-Operating System (RTCOS) for simultaneously supporting real-time and non-real-time activities on a workstation with two or more processors. The RT...
Gebran Krikor, Md. Touhidur Raza, David B. Stewart
EUROSYS
2008
ACM
16 years 1 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...