Sciweavers

4820 search results - page 375 / 964
» Implementing Signatures for C
Sort
View
SCP
2008
86views more  SCP 2008»
15 years 4 months ago
Quantifying the yield of risk-bearing IT-portfolios
We proposed a method to quantify the yield of an IT-investment portfolio in an environment of uncertainty and risk. For various common implementation scenarios such as growing dem...
R. J. Peters, Chris Verhoef
TPDS
2008
130views more  TPDS 2008»
15 years 4 months ago
NFS-CD: Write-Enabled Cooperative Caching in NFS
We present the Network File System with Cluster Delegation (NFS-CD), an enhancement to the NFSv4 that reduces server load and increases the scalability of distributed file systems ...
Alexandros Batsakis, Randal C. Burns
COMGEO
2000
ACM
15 years 4 months ago
Fast and accurate collision detection for haptic interaction using a three degree-of-freedom force-feedback device
We present a fast and accurate collision detection algorithm for haptic interaction with polygonal models. Given a model, we pre-compute a hybrid hierarchical representation, cons...
Arthur D. Gregory, Ming C. Lin, Stefan Gottschalk,...
121
Voted
CTW
2002
75views more  CTW 2002»
15 years 4 months ago
The Use of a Formalised Risk Model in NHS Information System Development
: Information Systems (IS) and technology are used extensively throughout the NHS, and the 1998 national information strategy, "Information for Health", sets out how the ...
M. A. Jeffcott, C. W. Johnson
143
Voted
CORR
1999
Springer
120views Education» more  CORR 1999»
15 years 4 months ago
A Machine-Independent Debugger--Revisited
Most debuggers are notoriously machine-dependent, but some recent research prototypes achieve varying degrees of machine-independence with novel designs. Cdb, a simple source-leve...
David R. Hanson