Sciweavers

14161 search results - page 2823 / 2833
» On generalized middle-level problem
Sort
View
CHI
2011
ACM
12 years 11 months ago
When the implication is not to design (technology)
As HCI is applied in increasingly diverse contexts, it is important to consider situations in which computational or information technologies may be less appropriate. This paper p...
Eric P. S. Baumer, M. Six Silberman
EUROSYS
2011
ACM
12 years 11 months ago
Finding complex concurrency bugs in large multi-threaded applications
Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, an...
Pedro Fonseca, Cheng Li, Rodrigo Rodrigues
ICUIMC
2011
ACM
12 years 11 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...
ISPD
2011
ACM
253views Hardware» more  ISPD 2011»
12 years 11 months ago
Assembling 2D blocks into 3D chips
Three-dimensional ICs promise to significantly extend the scale of system integration and facilitate new-generation electronics. However, progress in commercial 3D ICs has been s...
Johann Knechtel, Igor L. Markov, Jens Lienig
JAIR
2011
214views more  JAIR 2011»
12 years 11 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
« Prev « First page 2823 / 2833 Last » Next »