Sciweavers

6434 search results - page 1027 / 1287
» Model Transformations with Reference Models
Sort
View
CHI
2009
ACM
16 years 4 months ago
Conversation clusters: grouping conversation topics through human-computer dialog
Conversation Clusters explores the use of visualization to highlight salient moments of live conversation while archiving a meeting. Cheaper storage and easy access to recording d...
Tony Bergstrom, Karrie Karahalios
CHI
2008
ACM
16 years 4 months ago
Generalized selection via interactive query relaxation
Selection is a fundamental task in interactive applications, typically performed by clicking or lassoing items of interest. However, users may require more nuanced forms of select...
Jeffrey Heer, Maneesh Agrawala, Wesley Willett
CHI
2008
ACM
16 years 4 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
VLSID
2004
IEEE
139views VLSI» more  VLSID 2004»
16 years 4 months ago
Open Defects Detection within 6T SRAM Cells using a No Write Recovery Test Mode
The detection of all open defects within 6T SRAM cells is always a challenge due to the significant test time requirements. This paper proposes a new design-for-test (DFT) techniq...
André Ivanov, Baosheng Wang, Josh Yang
250
Voted
POPL
2007
ACM
16 years 4 months ago
Locality approximation using time
Reuse distance (i.e. LRU stack distance) precisely characterizes program locality and has been a basic tool for memory system research since the 1970s. However, the high cost of m...
Xipeng Shen, Jonathan Shaw, Brian Meeker, Chen Din...
« Prev « First page 1027 / 1287 Last » Next »