Sciweavers

1963 search results - page 348 / 393
» How is aliasing used in systems software
Sort
View
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 9 months ago
Query result clustering for object-level search
Query result clustering has recently attracted a lot of attention to provide users with a succinct overview of relevant results. However, little work has been done on organizing t...
Jongwuk Lee, Seung-won Hwang, Zaiqing Nie, Ji-Rong...
CHI
2004
ACM
14 years 9 months ago
Single-handed interaction techniques for multiple pressure-sensitive strips
We present a set of interaction techniques that make novel use of a small pressure-sensitive pad to allow one-handed direct control of a large number of parameters. The surface of...
Gábor Blaskó, Steven Feiner
HICSS
2005
IEEE
97views Biometrics» more  HICSS 2005»
14 years 2 months ago
Experiences with Conducting Project Postmortems: Reports vs. Stories and Practitioner Perspective
The most popular unit of work in organizations is a project. Managing knowledge in and about projects is salient for successful project management. Explicit knowledge is easier to...
Kevin C. Desouza, Torgeir Dingsøyr, Yukika ...
IFM
2004
Springer
104views Formal Methods» more  IFM 2004»
14 years 2 months ago
Linking CSP-OZ with UML and Java: A Case Study
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engine...
Michael Möller, Ernst-Rüdiger Olderog, H...
HICSS
1994
IEEE
152views Biometrics» more  HICSS 1994»
14 years 1 months ago
Simple COMA Node Implementations
Shared memory architectures often have caches to reduce the number of slow remote memory accesses. The largest possible caches exist in shared memory architectures called Cache-On...
Erik Hagersten, Ashley Saulsbury, Anders Landin