Sciweavers

2977 search results - page 417 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
113
Voted
SIGMETRICS
2006
ACM
123views Hardware» more  SIGMETRICS 2006»
15 years 7 months ago
Exploiting redundancy to conserve energy in storage systems
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that leverages the redundancy in storage systems to conserve disk energy. Second, it e...
Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnic...
ANCS
2005
ACM
15 years 7 months ago
Gigabit routing on a software-exposed tiled-microprocessor
This paper investigates the suitability of emerging tiled-architectures, equipped with low-latency on-chip networks, for high-performance network routing. In this paper, we presen...
Umar Saif, James W. Anderson, Anthony Degangi, Ana...
SAC
2005
ACM
15 years 7 months ago
Efficient placement and routing in grid-based networks
This paper presents an efficient technique for placement and routing of sensors/actuators and processing units in a grid network. Our system requires an extremely high level of ro...
Roozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid ...
IUI
2004
ACM
15 years 7 months ago
Usability trade-offs for adaptive user interfaces: ease of use and learnability
An analysis of context-aware user interfaces shows that adaptation mechanisms have a cost-benefit trade-off for usability. Unpredictable autonomous interface adaptations can easil...
Tim F. Paymans, Jasper Lindenberg, Mark A. Neerinc...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 7 months ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...