Sciweavers

1172 search results - page 153 / 235
» Who killed design
Sort
View
SISW
2003
IEEE
14 years 3 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
SIGDOC
2003
ACM
14 years 3 months ago
Alternative methods for field usability research
Field usability research involves observing people in their own environments—for example, workplaces, homes, and schools—to learn their normal or natural behavior. Through fie...
Laurie Kantner, Deborah Hinderer Sova, Stephanie R...
SIGUCCS
2003
ACM
14 years 3 months ago
Supporting a Windows XP/Red Hat Linux dual boot environment
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Bert Valenzuela
ICCBR
2003
Springer
14 years 3 months ago
Predicting Software Development Project Outcomes
Case-based reasoning is a flexible methodology to manage software development related tasks. However, when the reasoner’s task is prediction, there are a number of different CBR ...
Rosina Weber, Michael Waller, June M. Verner, Will...
CF
2010
ACM
14 years 3 months ago
ERBIUM: a deterministic, concurrent intermediate representation for portable and scalable performance
Tuning applications for multi-core systems involve subtle concepts and target-dependent optimizations. New languages are being designed to express concurrency and locality without...
Cupertino Miranda, Philippe Dumont, Albert Cohen, ...