Sciweavers

608 search results - page 93 / 122
» Random Systems with Complete Connections
Sort
View
PLDI
2009
ACM
14 years 4 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer
CSE
2009
IEEE
14 years 4 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
ISMAR
2009
IEEE
14 years 4 months ago
Evaluating the benefits of augmented reality for task localization in maintenance of an armored personnel carrier turret
We present the design, implementation, and user testing of a prototype augmented reality application to support military mechanics conducting routine maintenance tasks inside an a...
Steven J. Henderson, Steven Feiner
SIGIR
2009
ACM
14 years 4 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
14 years 4 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl