Sciweavers

5448 search results - page 883 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
15 years 9 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
CSCW
2004
ACM
15 years 9 months ago
Emergent networks, locus of control, and the pursuit of social capital
In this paper we examine the relationship between emergent social network characteristics in a computer-supported collaborative learning course and locus of control. An emergent c...
Michael Stefanone, Jeffrey T. Hancock, Geri Gay, A...
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl
NORDICHI
2004
ACM
15 years 9 months ago
Visual attention tracking during program debugging
This paper reports on a study which compared two tools for tracking the focus of visual attention - a remote eye tracker and the Restricted Focus Viewer (RFV). The RFV tool blurs ...
Roman Bednarik, Markku Tukiainen
SLIP
2004
ACM
15 years 9 months ago
Interconnect-power dissipation in a microprocessor
Interconnect power is dynamic power dissipation due to switching of interconnection capacitances. This paper describes the characterization of interconnect power in a state-of-the...
Nir Magen, Avinoam Kolodny, Uri C. Weiser, Nachum ...