Sciweavers

11231 search results - page 1864 / 2247
» Digging for Data Structures
Sort
View
CHI
2005
ACM
16 years 4 months ago
Managers' email: beyond tasks and to-dos
In this paper, we describe preliminary findings that indicate that managers and non-mangers think about their email differently. We asked three research managers and three researc...
Catalina Danis, Wendy A. Kellogg, Tessa A. Lau, Ma...
VLSID
2006
IEEE
121views VLSI» more  VLSID 2006»
16 years 4 months ago
An Integrated Approach for Combining BDD and SAT Provers
Many formal verification tools today are based on Boolean proof techniques. The two most powerful approaches in this context are Binary Decision Diagrams (BDDs) and methods based ...
Rolf Drechsler, Görschwin Fey, Sebastian Kind...
HPCA
2001
IEEE
16 years 4 months ago
JETTY: Filtering Snoops for Reduced Energy Consumption in SMP Servers
We propose methods for reducing the energy consumed by snoop requests in snoopy bus-based symmetric multiprocessor (SMP) systems. Observing that a large fraction of snoops do not ...
Andreas Moshovos, Gokhan Memik, Babak Falsafi, Alo...
CHI
2003
ACM
16 years 4 months ago
A fisheye calendar interface for PDAs: providing overviews for small displays
Calendar applications for small handheld devices such as PDAs are growing in popularity. This led us to develop FishCal, a novel calendar interface for PDAs. It supports users in ...
Benjamin B. Bederson, Aaron Clamage, Mary Czerwins...
POPL
2005
ACM
16 years 4 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
« Prev « First page 1864 / 2247 Last » Next »