Sciweavers

671 search results - page 80 / 135
» On Observing and Constraining Active Systems
Sort
View
93
Voted
CHI
1993
ACM
15 years 4 months ago
One is not enough: multiple views in a media space
Media spaces support collaboration, but the limited access they provide to remote colleagues' activities can undermine their utility. To address this limitation, we built an ...
William W. Gaver, Abigail Sellen, Christian Heath,...
IJON
2007
99views more  IJON 2007»
15 years 17 days ago
Criticality of avalanche dynamics in adaptive recurrent networks
In many studies of self-organized criticality (SOC), branching processes were used to model the dynamics of the activity of the system during avalanches. This mathematical simpliļ...
Anna Levina, Udo Ernst, J. Michael Herrmann
99
Voted
TROB
2008
113views more  TROB 2008»
15 years 16 days ago
Occam's Razor Applied to Network Topology Inference
We present a method for inferring the topology of a sensor network given nondiscriminating observations of activity in the monitored region. This is accomplished based on no prior ...
Dimitri Marinakis, Gregory Dudek
ASE
1998
89views more  ASE 1998»
15 years 11 days ago
Extending Design Environments to Software Architecture Design
Designing a complex software system is a cognitivelychallengingtask; thus, designers need cognitive support to create good designs. Domain-oriented design environments are cooperat...
Jason E. Robbins, David M. Hilbert, David F. Redmi...
113
Voted
EUROSYS
2008
ACM
15 years 9 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti