Sciweavers

24529 search results - page 4788 / 4906
» Computing on Authenticated Data
Sort
View
127
Voted
SBACPAD
2005
IEEE
176views Hardware» more  SBACPAD 2005»
15 years 8 months ago
Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation
The time required to simulate a complete benchmark program using the cycle-accurate model of a microprocessor can be prohibitively high. One of the proposed methodologies, represe...
Yue Luo, Ajay Joshi, Aashish Phansalkar, Lizy Kuri...
VISUALIZATION
2005
IEEE
15 years 8 months ago
Exploring 2D Tensor Fields Using Stress Nets
In this article we describe stress nets, a technique for exploring 2D tensor fields. Our method allows a user to examine simultaneously the tensors' eigenvectors (both major ...
Andrew Wilson, Rebecca M. Brannon
VL
2005
IEEE
113views Visual Languages» more  VL 2005»
15 years 8 months ago
Estimating the Numbers of End Users and End User Programmers
In 1995, Boehm predicted that by 2005, there would be “55 million performers” of “end user programming” in the United States. The original context and method which generat...
Christopher Scaffidi, Mary Shaw, Brad A. Myers
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 8 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
112
Voted
MOBICOM
2005
ACM
15 years 8 months ago
An analytical model for the dimensioning of a GPRS/EDGE network with a capacity constraint on a group of cells
This paper is a contribution to the generic problem of having simple and accurate models to dimension radio cells with data traffic on a GPRS or EDGE network. It addresses the iss...
Georges Nogueira, Bruno Baynat, Pierre Eisenmann
« Prev « First page 4788 / 4906 Last » Next »