Sciweavers

3025 search results - page 176 / 605
» A User-Centered Location Model
Sort
View
CHI
2010
ACM
15 years 11 months ago
The generalized perceived input point model and how to double touch accuracy by extracting fingerprints
It is generally assumed that touch input cannot be accurate because of the fat finger problem, i.e., the softness of the fingertip combined with the occlusion of the target by the...
Christian Holz, Patrick Baudisch
IPPS
2006
IEEE
15 years 10 months ago
Relationships between communication models in networks using atomic registers
A distributed system is commonly modelled by a graph where nodes represent processors and there is an edge between two processors if and only if they can communicate directly. In ...
Lisa Higham, Colette Johnen
ISOLA
2010
Springer
15 years 2 months ago
WOMM: A Weak Operational Memory Model
Abstract. Memory models of shared memory concurrent programs define the values a read of a shared memory location is allowed to see. Such memory models are typically weaker than t...
Arnab De, Abhik Roychoudhury, Deepak D'Souza
116
Voted
SIGUCCS
2003
ACM
15 years 9 months ago
The SNet model: access, security and e-services for students
This paper will explore the SNet model that Hunter College of the City University of New York developed and implemented. During the Spring of 2002, CUNY as a central organization ...
Anand Padmanabhan
ICSE
1997
IEEE-ACM
15 years 8 months ago
Characterizing and Modeling the Cost of Rework in a Library of Reusable Software Components
1 In this paper we characterize and model the cost of rework in a Component Factory (CF) organization. A CF is responsible for developing and packaging reusable software components...
Victor R. Basili, Steven E. Condon, Khaled El Emam...