Sciweavers

8468 search results - page 71 / 1694
» The Technology of Data Stashing
Sort
View
CN
2007
95views more  CN 2007»
14 years 9 months ago
A survey on emerging broadband wireless access technologies
Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize em...
Mehmet S. Kuran, Tuna Tugcu
ISCA
2009
IEEE
189views Hardware» more  ISCA 2009»
15 years 4 months ago
Hybrid cache architecture with disparate memory technologies
Caching techniques have been an efficient mechanism for mitigating the effects of the processor-memory speed gap. Traditional multi-level SRAM-based cache hierarchies, especially...
Xiaoxia Wu, Jian Li, Lixin Zhang, Evan Speight, Ra...
IJDSST
2010
107views more  IJDSST 2010»
14 years 7 months ago
Using the Rhizomer Platform for Semantic Decision Support Systems Development
Decision support systems get more useful as they manage to make decisions more informed. However, the cost of information and of combining and making it available in the appropriat...
Roberto García
CHI
2003
ACM
15 years 10 months ago
Leaders leading? a shift in technology adoption
In the past, most early hands-on users of interactive software in organizations were individual contributors. Managers as early adopters is a new trend with significant implicatio...
Jonathan Grudin
HUC
2009
Springer
15 years 2 months ago
Encountering SenseCam: personal recording technologies in everyday life
In this paper, we present a study of responses to the idea of being recorded by a ubicomp recording technology called SenseCam. This study focused on real-life situations in two N...
David H. Nguyen, Gabriela Marcu, Gillian R. Hayes,...