Sciweavers

2555 search results - page 354 / 511
» Quantifiers and Working Memory
Sort
View
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 4 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
CHI
2006
ACM
16 years 4 months ago
The paradox of the assisted user: guidance can be counterproductive
This paper investigates the influence of interface styles on problem solving performance. It is often assumed that performance on problem solving tasks improves when users are ass...
Christof van Nimwegen, Daniel D. Burgos, Herre van...
CHI
2005
ACM
16 years 4 months ago
When participants do the capturing: the role of media in diary studies
In this paper, we investigate how the choice of media for capture and access affects the diary study method. The diary study is a method of understanding participant behavior and ...
Scott Carter, Jennifer Mankoff
HPCA
2008
IEEE
16 years 4 months ago
Gaining insights into multicore cache partitioning: Bridging the gap between simulation and real systems
Cache partitioning and sharing is critical to the effective utilization of multicore processors. However, almost all existing studies have been evaluated by simulation that often ...
Jiang Lin, Qingda Lu, Xiaoning Ding, Zhao Zhang, X...
POPL
2003
ACM
16 years 4 months ago
New results on the computability and complexity of points - to analysis
Given a program and two variables p and q, the goal of points-to analysis is to check if p can point to q in some execution of the program. This well-studied problem plays a cruci...
Venkatesan T. Chakaravarthy