Sciweavers

8468 search results - page 1345 / 1694
» The Technology of Data Stashing
Sort
View
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
15 years 6 months ago
Towards an Understanding of Social Software: The Case of Arinia
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Stuart J. Barnes, Martin Böhringer, Christian...
TEI
2010
ACM
201views Hardware» more  TEI 2010»
15 years 6 months ago
Objects in play: virtual environments and tactile learning
When creating technology environments for children, consideration needs to be given to how touch, gesture, and physical interactions impact on play and learning. This is particula...
Lillian Spina-Caza
FOIKS
2010
Springer
15 years 6 months ago
Theoretical Foundations for Enabling a Web of Knowledge
The current web is a web of linked pages. Frustrated users search for facts by guessing which keywords or keyword phrases might lead them to pages where they can find facts. Can w...
David W. Embley, Andrew Zitzelberger
LATIN
2010
Springer
15 years 6 months ago
Layered Working-Set Trees
The working-set bound [Sleator and Tarjan, J. ACM, 1985] roughly states that searching for an element is fast if the element was accessed recently. Binary search trees, such as sp...
Prosenjit Bose, Karim Douïeb, Vida Dujmovic, ...
LATIN
2010
Springer
15 years 6 months ago
The Language Theory of Bounded Context-Switching
Concurrent compositions of recursive programs with finite a natural abstraction model for concurrent programs. Since reachability is undecidable for this class, a restricted form ...
Salvatore La Torre, Parthasarathy Madhusudan, Genn...
« Prev « First page 1345 / 1694 Last » Next »