Sciweavers

7189 search results - page 1336 / 1438
» Connecting Design with Code
Sort
View
ICPP
2009
IEEE
15 years 10 months ago
Improving Resource Availability by Relaxing Network Allocation Constraints on Blue Gene/P
— High-end computing (HEC) systems have passed the petaflop barrier and continue to move toward the next frontier of exascale computing. As companies and research institutes con...
Narayan Desai, Darius Buntinas, Daniel Buettner, P...
CANDC
2009
ACM
15 years 9 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
GROUP
2009
ACM
15 years 9 months ago
WaterCooler: exploring an organization through enterprise social media
As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people wit...
Michael J. Brzozowski
IWCMC
2009
ACM
15 years 9 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
MM
2009
ACM
126views Multimedia» more  MM 2009»
15 years 9 months ago
MOGFUN: musical mObile group for FUN
The computational power and sensory capabilities of mobile devices are increasing dramatically these days, rendering them suitable for real-time sound synthesis and various musica...
Yinsheng Zhou, Zhonghua Li, Dillion Tan, Graham Pe...
« Prev « First page 1336 / 1438 Last » Next »