Sciweavers

694 search results - page 56 / 139
» Supporting Research with Weblogs: A Study on Web-Based Resea...
Sort
View
IPPS
2002
IEEE
14 years 1 months ago
Utilization-Based Heuristics for Statically Mapping Real-Time Applications onto the HiPer-D Heterogeneous Computing System
Real-time applications continue to increase in importance as they are employed in various critical areas, such as command and control systems. These applications have traditionall...
Shoukat Ali, Jong-Kook Kim, Yang Yu, Shriram B. Gu...
DC
2008
13 years 8 months ago
On implementing omega in systems with weak reliability and synchrony assumptions
We study the feasibility and cost of implementing --a fundamental failure detector at the core of many algorithms--in systems with weak reliability and synchrony assumptions. Intui...
Marcos Kawazoe Aguilera, Carole Delporte-Gallet, H...
AC
1998
Springer
13 years 8 months ago
Cellular Automata Models of Self-Replicating Systems
Abstract: Since von Neumann's seminal work around 1950, computer scientists and others have studied the algorithms needed to support self-replicating systems. Much of this wor...
James A. Reggia, Hui-Hsien Chou, Jason D. Lohn
CHI
2001
ACM
14 years 8 months ago
Single display privacyware: augmenting public displays with private information
The research area of Single Display Groupware (SDG) confronts the standard model of computing interaction, one user working on one computer, by investigating how to best support g...
Garth B. D. Shoemaker, Kori Inkpen
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
14 years 2 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...