Sciweavers

653 search results - page 39 / 131
» Specifying Business Requirements through Interaction Design
Sort
View
105
Voted
PPOPP
2009
ACM
16 years 1 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha
92
Voted
PVLDB
2010
132views more  PVLDB 2010»
14 years 11 months ago
CoDA: Interactive Cluster Based Concept Discovery
Large data resources are ubiquitous in science and business. For these domains, an intuitive view on the data is essential to fully exploit the hidden knowledge. Often, these data...
Stephan Günnemann, Ines Färber, Hardy Kr...
90
Voted
IPPS
1998
IEEE
15 years 5 months ago
Deriving Efficient Cache Coherence Protocols through Refinement
Abstract. We address the problem of developing efficient cache coherence protocols implementing distributed shared memory (DSM) using message passing. A serious drawback of traditi...
Ratan Nalumasu, Ganesh Gopalakrishnan
82
Voted
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 5 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
153
Voted
ACMACE
2011
ACM
14 years 23 days ago
WeQuest: scalable alternate reality games through end-user content authoring
Alternate Reality Games (ARGs) are interactive narrative experiences that engage the player by layering a fictional world over the real world. Mobile ARG stories are often geo-sp...
Andrew Macvean, Sanjeet Hajarnis, Brandon Headrick...