Sciweavers

897 search results - page 87 / 180
» Identity: How to name it, How to find it
Sort
View
MICRO
2002
IEEE
156views Hardware» more  MICRO 2002»
15 years 1 months ago
TCP Switching: Exposing Circuits to IP
There has been much discussion about the best way to combine the benefits of new optical circuit switching technology with the established packet switched Internet. In this paper,...
Pablo Molinero-Fernández, Nick McKeown
156
Voted
RV
2009
Springer
155views Hardware» more  RV 2009»
15 years 6 months ago
Hardware Supported Flexible Monitoring: Early Results
Monitoring of software’s execution is crucial in numerous software development tasks. Current monitoring efforts generally require extensive instrumentation of the software or d...
Antonia Zhai, Guojin He, Mats Per Erik Heimdahl
KDD
2001
ACM
124views Data Mining» more  KDD 2001»
16 years 2 months ago
Tri-plots: scalable tools for multidimensional data mining
We focus on the problem of finding patterns across two large, multidimensional datasets. For example, given feature vectors of healthy and of non-healthy patients, we want to answ...
Agma J. M. Traina, Caetano Traina Jr., Spiros Papa...
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 8 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
SAC
2006
ACM
15 years 7 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi