Sciweavers

4139 search results - page 775 / 828
» Designing and Implementing Combinator Languages
Sort
View
116
Voted
CHI
2009
ACM
16 years 4 months ago
The effect of affective iconic realism on anonymous interactants' self-disclosure
In this paper, we describe progress in research designed to explore the effect of the combination of avatars' visual fidelity and users' anticipated future interaction o...
Sin-Hwa Kang, Jonathan Gratch, James H. Watt
131
Voted
HPCA
2001
IEEE
16 years 4 months ago
Self-Tuned Congestion Control for Multiprocessor Networks
Network performance in tightly-coupled multiprocessors typically degrades rapidly beyond network saturation. Consequently, designers must keep a network below its saturation point...
Mithuna Thottethodi, Alvin R. Lebeck, Shubhendu S....
208
Voted
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
16 years 3 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
151
Voted
ICCAD
2008
IEEE
133views Hardware» more  ICCAD 2008»
16 years 17 days ago
Module locking in biochemical synthesis
—We are developing a framework for computation with biochemical reactions with a focus on synthesizing specific logical functionality, a task analogous to technology-independent...
Brian Fett, Marc D. Riedel
135
Voted
ICCAD
2005
IEEE
127views Hardware» more  ICCAD 2005»
16 years 17 days ago
Hardware synthesis from guarded atomic actions with performance specifications
We present a new hardware synthesis methodology for guarded atomic actions (or rules), which satisfies performance-related scheduling specifications provided by the designer. The ...
Daniel L. Rosenband