Sciweavers

132 search results - page 26 / 27
» Identifying Bullies with a Computer Game
Sort
View
CP
2008
Springer
13 years 11 months ago
A Constraint Programming Approach for Allocation and Scheduling on the CELL Broadband Engine
The Cell BE processor provides both scalable computation power and flexibility, and it is already being adopted for many computational intensive applications like aerospace, defens...
Luca Benini, Michele Lombardi, Michela Milano, Mar...
CHI
2005
ACM
14 years 10 months ago
ECHOES: encouraging companionship, home organization, and entertainment in seniors
The ECHOES project (Encouraging Companionship, Home Organization, and Entertainment in Seniors), is focused on understanding and improving aspects of companionship in senior popul...
Justin Donaldson, Joshua Evnin, Sidharth Saxena
EMSOFT
2005
Springer
14 years 3 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
DATE
2006
IEEE
122views Hardware» more  DATE 2006»
14 years 3 months ago
Power analysis of mobile 3D graphics
— The world of 3D graphics, until recently restricted to high-end workstations and game consoles, is rapidly expanding into the domain of mobile platforms such as cellular phones...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi
CODES
2008
IEEE
13 years 11 months ago
Performance debugging of Esterel specifications
Synchronous languages like Esterel have been widely adopted for designing reactive systems in safety-critical domains such as avionics. Specifications written in Esterel are based...
Lei Ju, Bach Khoa Huynh, Abhik Roychoudhury, Samar...