Sciweavers

184 search results - page 32 / 37
» Design and Use of Some New Digital Musical Instruments
Sort
View
103
Voted
ASPLOS
2006
ACM
15 years 1 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
93
Voted
DOCENG
2004
ACM
15 years 5 months ago
Techniques for authoring complex XML documents
This paper reviews the main innovations of XML and considers their impact on the editing techniques for structured documents. Namespaces open the way to compound documents; well-f...
Vincent Quint, Irène Vatton
ICS
2010
Tsinghua U.
15 years 1 months ago
Timing local streams: improving timeliness in data prefetching
Data prefetching technique is widely used to bridge the growing performance gap between processor and memory. Numerous prefetching techniques have been proposed to exploit data pa...
Huaiyu Zhu, Yong Chen, Xian-He Sun
CSCW
2010
ACM
15 years 6 months ago
Telling the whole story: anticipation, inspiration and reputation in a field deployment of TellTable
We present a field study of TellTable, a new storytelling system designed to support creativity and collaboration amongst children. The application was deployed on a multitouch in...
Xiang Cao, Siân E. Lindley, John Helmes, Abi...
EUROSYS
2006
ACM
15 years 8 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...