Sciweavers

2035 search results - page 281 / 407
» Working memory
Sort
View
CHI
2003
ACM
16 years 4 months ago
Information voyeurism: social impact of physically large displays on information privacy
A common observation when working on physically large displays, such as wall-sized projection, is that a certain amount of information privacy is lost. A common explanation for th...
Desney S. Tan, Mary Czerwinski
CHI
2001
ACM
16 years 4 months ago
3D or not 3D? evaluating the effect of the third dimension in a document management system
Several recent research systems have provided interactive three-dimensional (3D) visualisations for supporting everyday work such as file and document management. But what improve...
Andy Cockburn, Bruce J. McKenzie
OSDI
2008
ACM
16 years 4 months ago
SR-IOV Networking in Xen: Architecture, Design and Implementation
SR-IOV capable network devices offer the benefits of direct I/O throughput and reduced CPU utilization while greatly increasing the scalability and sharing capabilities of the devi...
Yaozu Dong, Zhao Yu, Greg Rose
EDBT
2008
ACM
188views Database» more  EDBT 2008»
16 years 4 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...
ICFP
2006
ACM
16 years 4 months ago
Modular development of certified program verifiers with a proof assistant
I report on an experience using the Coq proof assistant to develop a program verification tool with a machine-checkable proof of full correctness. The verifier is able to prove me...
Adam J. Chlipala