Sciweavers

3555 search results - page 119 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ECIS
2004
15 years 2 months ago
Evaluation of phenomenological findings in IS research: a study in developing web-based IS
This paper presents a phenomenological investigation of project managers' experiences with the implementation of web-based employee service systems (ESS), a domain that has w...
Pradipta K. Sarkar, Jacob L. Cybulski
EDUTAINMENT
2009
Springer
15 years 8 months ago
Game-Like Simulations for Online Adaptive Learning: A Case Study
Serious games are becoming a powerful tool in education. However, there are still open issues needing further research to generalize the use of videogames and game-like simulations...
Javier Torrente, Pablo Moreno-Ger, Baltasar Fern&a...
ISMB
2007
15 years 3 months ago
A Chado case study: an ontology-based modular schema for representing genome-associated biological information
Motivation: A few years ago, FlyBase undertook to design a new database schema to store Drosophila data. It would fully integrate genomic sequence and annotation data with bibliog...
Chris Mungall, David B. Emmert
CORR
2012
Springer
281views Education» more  CORR 2012»
13 years 9 months ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong
SIGCOMM
2010
ACM
15 years 1 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser