Sciweavers

1096 search results - page 153 / 220
» Computation Slicing: Techniques and Theory
Sort
View
ICMI
2003
Springer
96views Biometrics» more  ICMI 2003»
14 years 2 months ago
Learning and reasoning about interruption
We present methods for inferring the cost of interrupting users based on multiple streams of events including information generated by interactions with computing devices, visual ...
Eric Horvitz, Johnson Apacible
DSN
2002
IEEE
14 years 2 months ago
Model Checking Safety Properties of Servo-Loop Control Systems
This paper presents the experiences of using a symbolic model checker to check the safety properties of a servoloop control system. Symbolic model checking has been shown to be be...
M. Edwin Johnson
GLVLSI
2002
IEEE
109views VLSI» more  GLVLSI 2002»
14 years 2 months ago
Minimizing resources in a repeating schedule for a split-node data-flow graph
Many computation-intensive or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graphs (DFGs). ...
Timothy W. O'Neil, Edwin Hsing-Mean Sha
HPCC
2009
Springer
14 years 2 months ago
On the Performance of Commit-Time-Locking Based Software Transactional Memory
Compared with lock-based synchronization techniques, Software Transactional Memory (STM) can significantly improve the programmability of multithreaded applications. Existing res...
Zhengyu He, Bo Hong
CHI
2000
ACM
14 years 2 months ago
Symmetric bimanual interaction
We present experimental work that explores the factors governing symmetric bimanual interaction in a two-handed task that requires the user to track a pair of targets, one target ...
Ravin Balakrishnan, Ken Hinckley