Sciweavers

10773 search results - page 2107 / 2155
» Ambient Computational Environments
Sort
View
115
Voted
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 8 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
121
Voted
ICRA
2002
IEEE
104views Robotics» more  ICRA 2002»
15 years 8 months ago
Improbability Filtering for Rejecting False Positives
—In this paper we describe a novel approach, called improbability filtering, to rejecting false-positive observations from degrading the tracking performance of an Extended Kalma...
Brett Browning, Michael H. Bowling, Manuela M. Vel...
174
Voted
VL
2002
IEEE
165views Visual Languages» more  VL 2002»
15 years 8 months ago
Co-Ordination of Multiple External Representations during Java Program Debugging
Java program debugging was investigated in computer science students who used a software debugging environment (SDE) that provided concurrently displayed, adjacent, multiple and l...
Pablo Romero, Rudi Lutz, Richard Cox, Benedict du ...
ICS
2010
Tsinghua U.
15 years 8 months ago
Handling task dependencies under strided and aliased references
The emergence of multicore processors has increased the need for simple parallel programming models usable by nonexperts. The ability to specify subparts of a bigger data structur...
Josep M. Pérez, Rosa M. Badia, Jesús...
DAC
2009
ACM
15 years 8 months ago
Vicis: a reliable network for unreliable silicon
Process scaling has given designers billions of transistors to work with. As feature sizes near the atomic scale, extensive variation and wearout inevitably make margining unecono...
David Fick, Andrew DeOrio, Jin Hu, Valeria Bertacc...
« Prev « First page 2107 / 2155 Last » Next »