Sciweavers

730 search results - page 136 / 146
» Interaction with a Mixed-Initiative System for Exploratory D...
Sort
View
RTSS
2006
IEEE
14 years 1 months ago
Tightening the Bounds on Feasible Preemption Points
Caches have become invaluable for higher-end architectures to hide, in part, the increasing gap between processor speed and memory access times. While the effect of caches on timi...
Harini Ramaprasad, Frank Mueller
CHI
2007
ACM
14 years 8 months ago
An observational study on information flow during nurses' shift change
We present an observational study that was conducted to guide the design and development of technologies to support information flow during nurses' shift change in a hospital...
Charlotte Tang, M. Sheelagh T. Carpendale
CHI
1997
ACM
14 years 3 days ago
The Amulet User Interface Development Environment
—The Amulet user interface development environment makes it easier for programmers to create highly-interactive, graphical user interface software for Unix, Windows and the Macin...
Brad A. Myers, Richard G. McDaniel, Robert C. Mill...
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
14 years 2 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
ICCAD
1996
IEEE
133views Hardware» more  ICCAD 1996»
14 years 2 days ago
Basic concepts for an HDL reverse engineering tool-set
Designer's productivity has become the key-factor of the development of electronic systems. An increasing application of design data reuse is widely recognized as a promising...
Gunther Lehmann, Bernhard Wunder, Klaus D. Mü...