Sciweavers

2632 search results - page 425 / 527
» Management Issues in Eda
Sort
View
MAM
2006
78views more  MAM 2006»
15 years 3 months ago
Operating system power minimization through run-time processor resource adaptation
The increasingly constrained power budget of today's microprocessor has resulted in a situation where power savings of all components in a system have to be taken into consid...
Tao Li, Lizy Kurian John
PUC
2006
72views more  PUC 2006»
15 years 3 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
15 years 3 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews
IJEB
2007
127views more  IJEB 2007»
15 years 3 months ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
SIGMOD
2008
ACM
145views Database» more  SIGMOD 2008»
15 years 3 months ago
Provenance and scientific workflows: challenges and opportunities
Provenance in the context of workflows, both for the data they derive and for their specification, is an essential component to allow for result reproducibility, sharing, and know...
Susan B. Davidson, Juliana Freire