Sciweavers

671 search results - page 80 / 135
» On Observing and Constraining Active Systems
Sort
View
CHI
1993
ACM
15 years 8 months ago
One is not enough: multiple views in a media space
Media spaces support collaboration, but the limited access they provide to remote colleagues' activities can undermine their utility. To address this limitation, we built an ...
William W. Gaver, Abigail Sellen, Christian Heath,...
IJON
2007
99views more  IJON 2007»
15 years 4 months ago
Criticality of avalanche dynamics in adaptive recurrent networks
In many studies of self-organized criticality (SOC), branching processes were used to model the dynamics of the activity of the system during avalanches. This mathematical simpliļ...
Anna Levina, Udo Ernst, J. Michael Herrmann
TROB
2008
113views more  TROB 2008»
15 years 4 months ago
Occam's Razor Applied to Network Topology Inference
We present a method for inferring the topology of a sensor network given nondiscriminating observations of activity in the monitored region. This is accomplished based on no prior ...
Dimitri Marinakis, Gregory Dudek
ASE
1998
89views more  ASE 1998»
15 years 4 months ago
Extending Design Environments to Software Architecture Design
Designing a complex software system is a cognitivelychallengingtask; thus, designers need cognitive support to create good designs. Domain-oriented design environments are cooperat...
Jason E. Robbins, David M. Hilbert, David F. Redmi...
EUROSYS
2008
ACM
16 years 1 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti