Sciweavers

1687 search results - page 282 / 338
» Interactive Computer Ethics Explorer
Sort
View
ICPP
2008
IEEE
15 years 4 months ago
Implementing and Exploiting Inevitability in Software Transactional Memory
—Transactional Memory (TM) takes responsibility for concurrent, atomic execution of labeled regions of code, freeing the programmer from the need to manage locks. Typical impleme...
Michael F. Spear, Michael Silverman, Luke Dalessan...
HUC
2007
Springer
15 years 4 months ago
Tracking Free-Weight Exercises
Weight training, in addition to aerobic exercises, is an important component of a balanced exercise program. However, mechanisms for tracking free weight exercises have not yet bee...
Keng-hao Chang, Mike Y. Chen, John Canny
HUC
2007
Springer
15 years 4 months ago
Addressing Mobile Phone Diversity in Ubicomp Experience Development
Mobile phones are a widely-available class of device with supporting communications infrastructure which can be appropriated and exploited to support ubicomp experiences. However m...
Chris Greenhalgh, Steve Benford, Adam Drozd, Marti...
CCECE
2006
IEEE
15 years 3 months ago
Lazy Generation of Building Interiors in Realtime
Impenetrable doors are often quite common in virtual worlds. This is especially apparent in video games boasting large urban environments. Although there are often enterable build...
Evan Hahn, Prosenjit Bose, Anthony Whitehead
DSN
2006
IEEE
15 years 3 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...