Sciweavers

3796 search results - page 275 / 760
» Presentations by Programmers for Programmers
Sort
View
152
Voted
INTERACT
2003
15 years 5 months ago
Programmorphosis: a Knowledge-Based Approach to End-User Programming
: Whereas sophisticated computer users can exercise more control in what they are exposed to and produce computational artifacts, technologically challenged end-users assume a more...
Andri Ioannidou
125
Voted
WSCG
2004
189views more  WSCG 2004»
15 years 5 months ago
Hardware Accelerated Soft Shadows using Penumbra Quads
Shadow mapping is a commonly used technique for generating hard shadows in real time. However, existing shadow map based algorithms cannot render full soft shadows penumbras onto ...
Jukka Arvo, Jan Westerholm
139
Voted
JPDC
2007
84views more  JPDC 2007»
15 years 3 months ago
Performance of memory reclamation for lockless synchronization
Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace l...
Thomas E. Hart, Paul E. McKenney, Angela Demke Bro...
146
Voted
COMPUTER
2000
138views more  COMPUTER 2000»
15 years 3 months ago
Making Pointer-Based Data Structures Cache Conscious
Processor and memory technology trends portend a continual increase in the relative cost of accessing main memory. Machine designers have tried to mitigate the effect of this tren...
Trishul M. Chilimbi, Mark D. Hill, James R. Larus
128
Voted
CN
1999
84views more  CN 1999»
15 years 3 months ago
Implementation of the pan-European academic research network: TEN-155
This paper addresses the implementation of a pan-European network to support co-operative research amongst European researchers: TEN-155. Predecessors to TEN-155 were TEN-34 and E...
Roberto Sabatino, Jose Manuel de Arce