• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 156
Next 10 →

Abstract Hyper-Threading Aware Process Scheduling Heuristics

by unknown authors
"... the first commercial implementation of simultaneous multithreading. Hyper-Threading allows a single physical processor to execute two heavyweight threads (processes) at the same time, dynamically sharing processor resources. This dynamic sharing of resources, particularly caches, causes a wide varie ..."
Abstract - Add to MetaCart
the first commercial implementation of simultaneous multithreading. Hyper-Threading allows a single physical processor to execute two heavyweight threads (processes) at the same time, dynamically sharing processor resources. This dynamic sharing of resources, particularly caches, causes a wide

Abstract- Over the past years, the Capability Maturity

by Ana Sofia, C. Marçal, Bruno Celso, C. Freitas, Felipe S. Furtado Soares, Arnaldo D. Belchior
"... (CMMI) have been broadly used for assessing organizational maturity and process capability throughout the world [20]. However, the rapid pace of change in information technology has caused increasing frustration with the heavyweight plans, specifications, and other documentation imposed by contractu ..."
Abstract - Add to MetaCart
(CMMI) have been broadly used for assessing organizational maturity and process capability throughout the world [20]. However, the rapid pace of change in information technology has caused increasing frustration with the heavyweight plans, specifications, and other documentation imposed

An Architecture for Intelligent Collaborative Educational Systems

by Dan Suthers, Dan Jones - AI-Ed 97, the 8th World Conference on Artificial Intelligence in Education, Kobe Japan , 1997
"... Abstract: A major technological concern of our work is to improve the cost effectiveness, reusability, and interoperability of advanced educational software. To make these technologies viable, we must be able to add component functionality incrementally, and enable systems to interoperate with comme ..."
Abstract - Cited by 62 (13 self) - Add to MetaCart
Abstract: A major technological concern of our work is to improve the cost effectiveness, reusability, and interoperability of advanced educational software. To make these technologies viable, we must be able to add component functionality incrementally, and enable systems to interoperate

Jalangi: A Selective Record-Replay and Dynamic Analysis Framework for JavaScript ABSTRACT

by Koushik Sen
"... JavaScript is widely used for writing client-side web applications and is getting increasingly popular for writing mobile applications. However, unlike C, C++, and Java, there are not that many tools available for analysis and testing of JavaScript applications. In this paper, we present a simple ye ..."
Abstract - Cited by 14 (4 self) - Add to MetaCart
yet powerful framework, called Jalangi, for writing heavyweight dynamic analyses. Our framework incorporates two key techniques: 1) selective record-replay, a technique which enables to record and to faithfully replay a user-selected part of the program, and 2) shadow values and shadow execution

OptiqueVQS: Visual Query Formulation for OBDA (Abstract)

by Ahmet Soylu, Evgeny Kharlamov, Dmitriy Zheleznyakov, Ernesto Jimenez-ruiz, Martin Giese, Ian Horrocks
"... Motivation Ontology Based Data Access (OBDA) [16] is a recently proposed promi-nent approach that aims at providing domain experts with a direct access to available enterprise data sources without IT-experts being involved. OBDA is an alternative to centralised approaches, where an IT-expert transla ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
-expert translates the requirements of domain ex-perts into Extract-Transform-Load (ETL) processes to first integrate the data and then to apply predefined analytical reporting tools. Currently, centralised approaches are com-monly used in enterprises; they, however, can become too heavy-weight and inflexible

Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services

by Dominique Guinard, Student Member, Student Member, Stamatis Karnouskos, Senior Member, Patrik Spiess, Domnic Savio
"... Abstract—The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, m ..."
Abstract - Cited by 65 (7 self) - Add to MetaCart
Abstract—The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic

Abstract GLOD: A Minimal Interface for Geometric Level of Detail

by unknown authors
"... We present GLOD, a geometric level of detail system integrated with the OpenGL rendering library. GLOD provides a low-level, lightweight API for level of detail operations. Unlike heavyweight scene graph systems, GLOD supports incremental adoption and may be easily integrated into existing OpenGL ap ..."
Abstract - Add to MetaCart
We present GLOD, a geometric level of detail system integrated with the OpenGL rendering library. GLOD provides a low-level, lightweight API for level of detail operations. Unlike heavyweight scene graph systems, GLOD supports incremental adoption and may be easily integrated into existing Open

Abstract Organisational security requirements: An agile approach to Ubiquitous Information Security.

by Dr. A. B. Ruighaver
"... This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security req ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security

Active Badge System using CORBA (Extended Abstract)

by Krzysztof Zielinski, Jakub Szymaszek, Andrzej Uszok , 1998
"... This paper presents the design and implementation of a new CORBA-based software for Active Badge System (ABS) originally designed at ORL in Cambridge UK [3]. Since the system was designed and constructed some drawbacks in its architecture and functionality have been identified during its exploitatio ..."
Abstract - Add to MetaCart
relatively small number of heavyweight objects. This made the system reconfiguration and management of the persistent data difficult. The system data were passed by value enabling inconsistencies in the system state. End applications operated on messages in the internal format of the ABS wire protocol

Abstract Bluepipe: A Scalable Architecture for On-the-Spot Digital Forensics

by Yun Gao, Golden G. Richard Iii, Vassil Roussev
"... Traditional digital forensics methods are based on the in-depth examination of computer systems in a lab setting. Such methods are standard practice in acquiring digital evidence and are indispensable as an investigative approach. However, they are also relatively heavyweight and expensive and requi ..."
Abstract - Add to MetaCart
Traditional digital forensics methods are based on the in-depth examination of computer systems in a lab setting. Such methods are standard practice in acquiring digital evidence and are indispensable as an investigative approach. However, they are also relatively heavyweight and expensive
Next 10 →
Results 11 - 20 of 156
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University