Sciweavers

1732 search results - page 178 / 347
» Knowledge-based organization evaluation
Sort
View
ACMDIS
2000
ACM
15 years 8 months ago
The Social Life of Engineering Authorizations
We may view documents, not only as “containers” for information, but also as active participants in organizing and sustaining communities. This paper discusses our experiences...
William A. Stubblefield, Karen S. Rogers
CSCW
2000
ACM
15 years 8 months ago
Beyond bowling together
Social resources like trust and shared identity make it easier for people to work and play together. Such social resources are sometimes referred to as social capital. Thirty year...
Paul Resnick, Tora K. Bikson, Elizabeth D. Mynatt,...
FC
1998
Springer
156views Cryptology» more  FC 1998»
15 years 8 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
DATE
1997
IEEE
75views Hardware» more  DATE 1997»
15 years 8 months ago
Using constraint logic programming in memory synthesis for general purpose computers
In modern computer systems the performance is dominated by the memory performance. Currently, there is neither a systematic design methodology nor a tool for the design of memory ...
Renate Beckmann, Jürgen Herrmann
ISCA
1997
IEEE
103views Hardware» more  ISCA 1997»
15 years 8 months ago
Designing High Bandwidth On-Chip Caches
In this paper we evaluate the performance of high bandwidth caches that employ multiple ports, multiple cycle hit times, on-chip DRAM, and a line buffer to find the organization t...
Kenneth M. Wilson, Kunle Olukotun