Sciweavers

1010 search results - page 150 / 202
» Designing Then and Now
Sort
View
148
Voted
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
13 years 1 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr
TOOLS
1999
IEEE
15 years 3 months ago
Employing Object Technology to Expose Fundamental Object Concepts
This paper reports on the utilisation of object technology in a university-level course on software development, specifically designed for distance learning, and now enrolling ove...
Mark Woodman, Robert Griffiths, Simon Holland, Hug...
CHI
1996
ACM
15 years 3 months ago
Email Overload: Exploring Personal Information Management of Email
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was originally designed as a communications application...
Steve Whittaker, Candace L. Sidner
BMCBI
2010
115views more  BMCBI 2010»
14 years 11 months ago
Importance of replication in analyzing time-series gene expression data: Corticosteroid dynamics and circadian patterns in rat l
Background: Microarray technology is a powerful and widely accepted experimental technique in molecular biology that allows studying genome wide transcriptional responses. However...
Tung T. Nguyen, Richard R. Almon, Debra C. DuBois,...
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
15 years 4 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli