Sciweavers

1519 search results - page 141 / 304
» What do they think
Sort
View
DATE
2003
IEEE
97views Hardware» more  DATE 2003»
14 years 3 months ago
Enhancing Speedup in Network Processing Applications by Exploiting Instruction Reuse with Flow Aggregation
Instruction reuse is a microarchitectural technique that improves the execution time of a program by removing redundant computations at run-time. Although this is the job of an op...
G. Surendra, Subhasis Banerjee, S. K. Nandy
ECAL
2003
Springer
14 years 3 months ago
Building a Hybrid Society of Mind Using Components from Ten Different Authors
Building large complex minds is difficult because we do not understand what the necessary components are or how they should interact. Even if the components were known it is diffic...
Ciarán O'Leary, Mark Humphrys
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 3 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
SEMWEB
2009
Springer
14 years 2 months ago
Reasoning With Provenance, Trust and all that other Meta Knowlege in OWL
Abstract—For many tasks, such as the integration of knowledge bases in the semantic web, one must not only handle the knowledge itself, but also characterizations of this knowled...
Simon Schenk, Renata Queiroz Dividino, Steffen Sta...
IUI
2000
ACM
14 years 2 months ago
SUITOR: an attentive information system
Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...