Sciweavers

3937 search results - page 679 / 788
» Questioning Ubiquitous Computing
Sort
View
SIGUCCS
2009
ACM
14 years 17 days ago
Frontline support at Princeton University: a centralized and decentralized approach
Frontline support and maintenance for desktop hardware and software systems at Princeton University has been uniquely structured, allowing the benefits of centralization and the f...
Maureen A. Novozinsky, Evelyne S. Roach, Leila M. ...
HPCN
2000
Springer
13 years 11 months ago
An Analytical Model for a Class of Architectures under Master-Slave Paradigm
We build an analytical model for an application utilizing master-slave paradigm. In the model, only three architecture parameters are used: latency, bandwidth and flop rate. Instea...
Yasemin Yalçinkaya, Trond Steihaug
ATAL
2008
Springer
13 years 10 months ago
A tractable and expressive class of marginal contribution nets and its applications
Coalitional games raise a number of important questions from the point of view of computer science, key among them being how to represent such games compactly, and how to efficien...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
BMCBI
2008
155views more  BMCBI 2008»
13 years 8 months ago
ComPath: comparative enzyme analysis and annotation in pathway/subsystem contexts
Background: Once a new genome is sequenced, one of the important questions is to determine the presence and absence of biological pathways. Analysis of biological pathways in a ge...
Kwangmin Choi, Sun Kim
SIAMCOMP
1998
118views more  SIAMCOMP 1998»
13 years 7 months ago
Genericity, Randomness, and Polynomial-Time Approximations
Polynomial-time safe and unsafe approximations for intractable sets were introduced by Meyer and Paterson [Technical Report TM-126, Laboratory for Computer Science, MIT, Cambridge,...
Yongge Wang