Sciweavers

10797 search results - page 1897 / 2160
» Robust control applications
Sort
View
ASPLOS
2004
ACM
15 years 10 months ago
Deconstructing storage arrays
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. Shear employs a set of controlled algorithms combined with statistical techniques to automat...
Timothy E. Denehy, John Bent, Florentina I. Popovi...
ASSETS
2004
ACM
15 years 10 months ago
Designing a cognitive aid for the home: a case-study approach
Cognitive impairments play a large role in the lives of surviviors of mild traumatic brain injuries who are unable to return to their prior level of independence in their homes. C...
Jessica Paradise, Elizabeth D. Mynatt, Cliff Willi...
CF
2004
ACM
15 years 10 months ago
An information-interconnectivity-based retrieval method for network attached storage
Network attached disk storage is characterized by independent network attachment and embedded intelligence. For Internet applications, it provides the key functionality of geograp...
Iliyak Georgiev, Ivo I. Georgiev
GRAPHITE
2004
ACM
15 years 10 months ago
Augmenting the science centre and museum experience
Recent advances in computer graphics and interactive techniques have increased the visual quality and flexibility of Augmented Reality (AR) applications. This, in turn has increas...
Eric Woods, Mark Billinghurst, Julian Looser, Grah...
ISSTA
2004
ACM
15 years 10 months ago
Automating commutativity analysis at the design level
Two operations commute if executing them serially in either order results in the same change of state. In a system in which commands may be issued simultaneously by different use...
Greg Dennis, Robert Seater, Derek Rayside, Daniel ...
« Prev « First page 1897 / 2160 Last » Next »