Sciweavers

5684 search results - page 1105 / 1137
» Computing with active dendrites
Sort
View
113
Voted
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 8 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
129
Voted
IEEEPACT
2003
IEEE
15 years 8 months ago
Constraint Graph Analysis of Multithreaded Programs
This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions fo...
Harold W. Cain, Mikko H. Lipasti, Ravi Nair
131
Voted
GROUP
2003
ACM
15 years 8 months ago
Using cursor prediction to smooth telepointer jitter
Telepointers are an important type of embodiment in real-time distributed groupware. Telepointers can increase the presence of remote participants and can provide considerable awa...
Carl Gutwin, Jeff Dyck, Jennifer Burkitt
GROUP
2003
ACM
15 years 8 months ago
Studying the effect of similarity in online task-focused interactions
Although the Internet provides powerful tools for social interactions, many tasks—for example, information-seeking—are undertaken as solitary activities. Information seekers a...
Dan Cosley, Pamela J. Ludford, Loren G. Terveen
139
Voted
SENSYS
2003
ACM
15 years 8 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
« Prev « First page 1105 / 1137 Last » Next »