Sciweavers

4647 search results - page 674 / 930
» Composite Design Patterns
Sort
View
134
Voted
ASSETS
2009
ACM
15 years 1 months ago
Fall and emergency detection with mobile phones
In this demo, we present an application for mobile phones which can monitor physical activities of users and detect unexpected emergency situations such as a sudden fall or accide...
Hamed Ketabdar, Tim Polzehl
183
Voted
GROUP
2009
ACM
15 years 1 months ago
Open innovation and the solver community
This paper introduces a doctoral research on open innovation solver's behavior and group factors inducing it. The research is now finishing its first year and exploratory str...
Margarida Cardoso, Isabel Ramos
ANCS
2010
ACM
15 years 28 days ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao
148
Voted
CCGRID
2010
IEEE
15 years 27 days ago
File-Access Characteristics of Data-Intensive Workflow Applications
This paper studies five real-world data intensive workflow applications in the fields of natural language processing, astronomy image analysis, and web data analysis. Data intensiv...
Takeshi Shibata, SungJun Choi, Kenjiro Taura
157
Voted
ENTCS
2010
101views more  ENTCS 2010»
15 years 26 days ago
Strengthening the Zipper
The zipper is a well known design pattern for providing a cursor-like interface to a data structure. However, the classic treatise by Huet only scratches the surface of some of it...
Tristan O. R. Allwood, Susan Eisenbach