Sciweavers

5355 search results - page 432 / 1071
» Modules
Sort
View
CN
2002
96views more  CN 2002»
15 years 4 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
CSCW
2000
ACM
15 years 4 months ago
A Tale of Two Toolkits: Relating Infrastructure and Use in Flexible CSCW Toolkits
The design of software toolkits embodies a fundamental tension. On the one hand, it aims to reduce programmer effort by providing prefabricated, reusable software modules encapsula...
Paul Dourish, W. Keith Edwards
ECCC
2000
158views more  ECCC 2000»
15 years 4 months ago
On the Computational Power of Winner-Take-All
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
Wolfgang Maass
DM
1999
145views more  DM 1999»
15 years 4 months ago
Modular decomposition and transitive orientation
A module of an undirected graph is a set X of nodes such for each node x not in X , either every member of X is adjacent to x, or no member of X is adjacent to x. There is a canon...
Ross M. McConnell, Jeremy Spinrad
NN
2002
Springer
105views Neural Networks» more  NN 2002»
15 years 4 months ago
The computational role of dopamine D1 receptors in working memory
The prefrontal cortex (PFC) is essential for working memory, which is the ability to transiently hold and manipulate information necessary for generating forthcoming action. PFC n...
Daniel Durstewitz, Jeremy K. Seamans