Sciweavers

8468 search results - page 1470 / 1694
» The Technology of Data Stashing
Sort
View
ISCAPDCS
2004
15 years 10 days ago
Pushmepullyou: The Reality of Interaction with Shared Objects in Networked Walk-in Displays
This paper investigates the reality of shared manipulation of objects between users in distributed walkin displays and presents solutions to address the effects of constraints of ...
David J. Roberts, Oliver Otto, Robin Wolff
ISCAPDCS
2004
15 years 10 days ago
An Adaptive OpenMP Loop Scheduler for Hyperthreaded SMPs
Hyperthreaded(HT) and simultaneous multithreaded (SMT) processors are now available in commodity workstations and servers. This technology is designed to increase throughput by ex...
Yun Zhang, Mihai Burcea, Victor Cheng, Ron Ho, Mic...
ECIS
2003
15 years 10 days ago
Shaping CIO's competencies and activities to improve company performance: an empirical study
The importance of and the fast changes in the CIO's role in organizations are widely recognized. So is the need for CIOs to acquire the appropriate set of knowledge and manag...
Marco Tagliavini, Jennifer Moro, Aurelio Ravarini,...
MASCOTS
2004
15 years 10 days ago
Reliability of MEMS-Based Storage Enclosures
MEMS-based storage is a new, non-volatile storage technology currently under development. It promises fast data access, high throughput, high storage density, small physical size,...
Bo Hong, Thomas J. E. Schwarz, Scott A. Brandt, Da...
93
Voted
FLAIRS
2003
15 years 10 days ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
« Prev « First page 1470 / 1694 Last » Next »