Sciweavers

1748 search results - page 292 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
IJIM
2007
139views more  IJIM 2007»
15 years 1 months ago
Evaluation Methods on Usability of M-Learning Environments
— Nowadays there are different evaluation methods focused in the assessment of the usability of telematic methods. The assessment of 3rd generation web environments evaluates the...
Teresa Magal Royo, Guillermo Peris-Fajarnés...
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
15 years 7 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
ASPLOS
1996
ACM
15 years 6 months ago
Shasta: A Low Overhead, Software-Only Approach for Supporting Fine-Grain Shared Memory
This paper describes Shasta, a system that supports a shared address space in software on clusters of computers with physically distributed memory. A unique aspect of Shasta compa...
Daniel J. Scales, Kourosh Gharachorloo, Chandramoh...
NN
2000
Springer
128views Neural Networks» more  NN 2000»
15 years 1 months ago
A recurrent neural network for solving linear projection equations
Linear projection equations arise in many optimization problems and have important applications in science and engineering. In this paper, we present a recurrent neural network fo...
Youshen Xia, Jun Wang
95
Voted
WSC
2007
15 years 4 months ago
Using ontologies for simulation integration
This paper describes the motivations, methods, and solution concepts for the use of ontologies for simulation model integration. Ontological analysis has been shown to be an effec...
Perakath C. Benjamin, Kumar V. Akella, Ajay Verma