Sciweavers

6171 search results - page 1204 / 1235
» The FrameNet Data and Software
Sort
View
119
Voted
SIGUCCS
1998
ACM
15 years 8 months ago
IT Training for Students, Who Needs It?
This presentation will be a discussion of two Information Technology training programs at the university/college level. The two programs are ”The Student Peer Trainers”(SPT) a...
Penny Haselwander
136
Voted
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
15 years 8 months ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
109
Voted
VLDB
1998
ACM
101views Database» more  VLDB 1998»
15 years 8 months ago
On Optimal Node Splitting for R-trees
The problem of finding an optimal bipartition of a rectangle set has a direct impact on query performance of dynamic R-trees. During update operations, overflowed nodes need to be...
Yván J. García, Mario A. Lopez, Scot...
129
Voted
CHI
1997
ACM
15 years 7 months ago
The Amulet User Interface Development Environment
—The Amulet user interface development environment makes it easier for programmers to create highly-interactive, graphical user interface software for Unix, Windows and the Macin...
Brad A. Myers, Richard G. McDaniel, Robert C. Mill...
129
Voted
SIGMETRICS
1996
ACM
118views Hardware» more  SIGMETRICS 1996»
15 years 7 months ago
Integrating Performance Monitoring and Communication in Parallel Computers
A large and increasing gap exists between processor and memory speeds in scalable cache-coherent multiprocessors. To cope with this situation, programmers and compiler writers mus...
Margaret Martonosi, David Ofelt, Mark Heinrich
« Prev « First page 1204 / 1235 Last » Next »