Sciweavers

1170 search results - page 159 / 234
» Between ends and fibers
Sort
View
LFP
1992
153views more  LFP 1992»
15 years 24 days ago
Reasoning About Programs in Continuation-Passing Style
The CPS transformation dates back to the early 1970's, where it arose as a technique to represent the control flow of programs in -calculus based programming languages as -te...
Amr Sabry, Matthias Felleisen
BCSHCI
2009
15 years 23 days ago
Evolving and augmenting worth mapping for family archives
We describe the process of developing worth maps from field research and initial design sketches for a digital Family Archive, which resulted in a more simple and flexible worth m...
Gilbert Cockton, David S. Kirk, Abigail Sellen, Ri...
CCGRID
2010
IEEE
15 years 23 days ago
Towards Energy Aware Scheduling for Precedence Constrained Parallel Tasks in a Cluster with DVFS
Abstract--Reducing energy consumption for high end computing can bring various benefits such as, reduce operating costs, increase system reliability, and environment respect. This ...
Lizhe Wang, Gregor von Laszewski, Jai Dayal, Fugan...
CIDR
2009
136views Algorithms» more  CIDR 2009»
15 years 22 days ago
The Role of Schema Matching in Large Enterprises
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of ...
Ken Smith, Michael Morse, Peter Mork, Maya Hao Li,...
CAISE
2010
Springer
14 years 12 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...