Sciweavers

1028 search results - page 162 / 206
» The future of simulation
Sort
View
IJHCI
2010
117views more  IJHCI 2010»
13 years 7 months ago
Avoiding Latent Design Conditions Using UI Discovery Tools
Motivation – Designers make decisions that later influence how users work with the systems that they have designed. When errors occur in use, it is tempting to focus on the acti...
Harold W. Thimbleby
INFOCOM
2010
IEEE
13 years 7 months ago
Resource Allocation in Multi-cell OFDMA-based Relay Networks
Abstract— Cooperative relay networks combined with Orthogonal Frequency Division Multiplexing Access (OFDMA) technology has been widely recognized as a promising candidate for fu...
Yao Hua, Qian Zhang, Zhisheng Niu
JUCS
2010
132views more  JUCS 2010»
13 years 7 months ago
A Mobile Intelligent Interruption Management System
: Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes ...
Sina Zulkernain, Praveen Madiraju, Sheikh Iqbal Ah...
MICRO
2010
IEEE
215views Hardware» more  MICRO 2010»
13 years 7 months ago
A Task-Centric Memory Model for Scalable Accelerator Architectures
This paper presents a task-centric memory model for 1000-core compute accelerators. Visual computing applications are emerging as an important class of workloads that can exploit ...
John H. Kelm, Daniel R. Johnson, Steven S. Lumetta...
TKDE
2010
272views more  TKDE 2010»
13 years 7 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta