Sciweavers

575 search results - page 66 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SAC
2006
ACM
14 years 1 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins
ISEM
2008
129views more  ISEM 2008»
13 years 7 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
CHI
2006
ACM
14 years 8 months ago
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing
Wizard of Oz (WOz) testing has shown promise as an effective way to test location-enhanced applications. However, it is challenging to conduct a location-based WOz test because of...
Yang Li, Evan Welbourne, James A. Landay
ER
1998
Springer
147views Database» more  ER 1998»
13 years 12 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
BIOCOMP
2008
13 years 9 months ago
Analysis of Protein-Ligand Interactions Using Localized Stereochemical Features
Computational analyses of protein structure-function relationships have traditionally been based on sequence homology, fold family analysis and 3D motifs/templates. Previous struct...
Reetal Pai, James C. Sacchettini, Thomas R. Ioerge...