Sciweavers

596 search results - page 91 / 120
» Theories of Access Consciousness
Sort
View
84
Voted
IPCCC
2006
IEEE
15 years 5 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
84
Voted
PARELEC
2006
IEEE
15 years 5 months ago
MPI and Non-MPI Simulations for Epitaxial Surface Growth
Usually, theories of surface growth are based on the study of global processes without taking in account the local behaviour of atoms. We have implemented two Montecarlo simulation...
Carmen B. Navarrete, Susana Holgado, Eloy Anguiano
78
Voted
PODC
2005
ACM
15 years 4 months ago
Routing complexity of faulty networks
One of the fundamental problems in distributed computing is how to efficiently perform routing in a faulty network in which each link fails with some probability. This paper inves...
Omer Angel, Itai Benjamini, Eran Ofek, Udi Wieder
CSCW
2004
ACM
15 years 4 months ago
Assembling the senses: towards the design of cooperative interfaces for visually impaired users
The needs of blind and visually impaired users are seriously under-investigated in CSCW. We review work on assistive interfaces especially concerning how collaboration between sig...
Fredrik Winberg, John Bowers
CIKM
2004
Springer
15 years 4 months ago
Extending and inferring functional dependencies in schema transformation
We study the representation, derivation and utilization of a special kind of constraints in multidatabase systems. A major challenge is when component database schemas are schemat...
Qi He, Tok Wang Ling