Sciweavers

7383 search results - page 1462 / 1477
» Theories of information behavior
Sort
View
OSDI
1996
ACM
14 years 11 months ago
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications
Current operating systems offer poor performance when a numeric application's working set does not fit in main memory. As a result, programmers who wish to solve "out-of...
Todd C. Mowry, Angela K. Demke, Orran Krieger
USENIX
1990
14 years 11 months ago
swm: An X Window Manager Shell
swm is a policy-free, user configurable window manager client for the X Window System. Besides providing basic window manager functionality, swm introduces new features not found ...
Thomas E. LaStrange
95
Voted
FUNGAMES
2010
14 years 10 months ago
Recognizing self in puppet controlled virtual avatars
Recent work in neuroscience suggests that there is a common coding in the brain between perception, imagination and execution of movement. Further, this common coding is considere...
Ali Mazalek, Michael Nitsche, Sanjay Chandrasekhar...
HUC
2010
Springer
14 years 10 months ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
ICFP
2010
ACM
14 years 10 months ago
Logical types for untyped languages
Programmers reason about their programs using a wide variety of formal and informal methods. Programmers in untyped languages such as Scheme or Erlang are able to use any such met...
Sam Tobin-Hochstadt, Matthias Felleisen
« Prev « First page 1462 / 1477 Last » Next »