Sciweavers

9405 search results - page 264 / 1881
» Computing a Model of Set Theory
Sort
View
ICMI
2003
Springer
96views Biometrics» more  ICMI 2003»
15 years 9 months ago
Learning and reasoning about interruption
We present methods for inferring the cost of interrupting users based on multiple streams of events including information generated by interactions with computing devices, visual ...
Eric Horvitz, Johnson Apacible
PODC
2010
ACM
15 years 8 months ago
Brief announcement: asynchronous bounded expected delay networks
We propose a natural generalisation of asynchronous bounded delay (ABD) network models. The commonly used ABD models assume a known bound on message delay. This assumption is ofte...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...
HICSS
1999
IEEE
139views Biometrics» more  HICSS 1999»
15 years 8 months ago
Five Degrees of Separation: A Human Capital Model of Employment-Related Decisionmaking in the Information Technology Workforce
Successful implementation of information technology (IT)-enabled strategy rests on the performance of IT professionals. Consequently, the development and retention of this "I...
Robert A. Josefek Jr., Robert J. Kauffman
ICS
2005
Tsinghua U.
15 years 10 months ago
The implications of working set analysis on supercomputing memory hierarchy design
Supercomputer architects strive to maximize the performance of scientific applications. Unfortunately, the large, unwieldy nature of most scientific applications has lead to the...
Richard C. Murphy, Arun Rodrigues, Peter M. Kogge,...
ACMICEC
2006
ACM
152views ECommerce» more  ACMICEC 2006»
15 years 10 months ago
Capacity allocation with competitive retailers
This paper addresses a problem in supply chain management that how scarce resources can be efficiently allocated among competing interests. We present a formal model of allocation...
Masabumi Furuhata, Dongmo Zhang