Sciweavers

287 search results - page 13 / 58
» Being John Malkovich
Sort
View
MICRO
1996
IEEE
96views Hardware» more  MICRO 1996»
15 years 1 months ago
Exceeding the Dataflow Limit via Value Prediction
For decades, the serialization constraints imposed by true data dependences have been regarded as an absolute limit--the dataflow limit--on the parallel execution of serial progra...
Mikko H. Lipasti, John Paul Shen
ICS
1993
Tsinghua U.
15 years 1 months ago
Anatomy of a Message in the Alewife Multiprocessor
Shared-memory provides a uniform and attractive mechanism for communication. For efficiency, it is often implemented with a layer of interpretive hardware on top of a message-pas...
John Kubiatowicz, Anant Agarwal
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 1 months ago
Air traffic management with target windows: An approach using reachability
Abstract-- We present the applications of reachability methods and computational tools based on game theory to a problem in air traffic management. The use of such methods in air t...
Kostas Margellos, John Lygeros
ENTER
2007
Springer
15 years 1 months ago
Developing Web-Based Tourist Information Tools Using Google Map
This paper reports an explanatory study of using Google Map API to develop two destinationspecific tourist information tools: a handheld tour guide and an online trip planner for ...
Bing Pan, John C. Crotts, Brian Muller
CANDT
2009
15 years 1 months ago
wConnect: a facebook-based developmental learning community to support women in information technology
The under-representation of women in computer and information science (CIS) has created a crisis in availability of qualified CIS professionals and diversity of perspectives. Many...
Mary Beth Rosson, John M. Carroll, Dejin Zhao, Tim...