Results 1 - 10
of
1,407
Programmer Information Needs After Memory Failure
"... Abstract—Despite its vast capacity and associative powers, the human brain does not deal well with interruptions. Particularly in situations where information density is high, such as during a programming task, recovering from an interruption requires extensive time and effort. Although modern progr ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
to dealing with work interruptions. The framework explains empirical results obtained from experiments in which programmers were interrupted. The intent is to use the framework to design development tools capable of compensating for human memory limitations. We also delineate programmer information needs
Availability versus accessibility of information in memory for words.
- J Verbal Learn Verbal Behav
, 1966
"... The Ss learned, on a single trial, lists of words belonging to explicitly designated conceptual categories. Lists varied in terms of length (12, 24, and 48 words) and number of words per category (1, 2, and 4). Immediate recall was tested either in presence or absence of category names as retrieval ..."
Abstract
-
Cited by 162 (0 self)
- Add to MetaCart
of recall of the word rises from a value near zero immediately before the presentation to a value near unity immediately after the presentation. The failure to recall some of the words, therefore, reflects intratrial forgetting
Enhancing Server Availability and Security Through Failure-Oblivious Computing
- In Proceedings 6 th Symposium on Operating Systems Design and Implementation (OSDI
, 2004
"... We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code simply ..."
Abstract
-
Cited by 180 (37 self)
- Add to MetaCart
techniques 1) make these servers invulnerable to known security attacks that exploit memory errors, and 2) enable the servers to continue to operate successfully to service legitimate requests and satisfy the needs of their users even after attacks trigger their memory errors. We observed several reasons
A Note on Distributed Computing
- IEEE Micro
, 1994
"... We argue that objects that interact in a distributed system need to be dealt with in ways that are intrinsically different from objects that interact in a single address space. These differences are required because distributed systems require that the programmer be aware of latency, have a differen ..."
Abstract
-
Cited by 206 (0 self)
- Add to MetaCart
We argue that objects that interact in a distributed system need to be dealt with in ways that are intrinsically different from objects that interact in a single address space. These differences are required because distributed systems require that the programmer be aware of latency, have a
Understanding Failures in Petascale Computers
"... With petascale computers only a year or two away there is a pressing need to anticipate and compensate for a probable increase in failure and application interruption rates. Researchers, designers and integrators have available to them far too little detailed information on the failures and interrup ..."
Abstract
-
Cited by 103 (6 self)
- Add to MetaCart
With petascale computers only a year or two away there is a pressing need to anticipate and compensate for a probable increase in failure and application interruption rates. Researchers, designers and integrators have available to them far too little detailed information on the failures
Foundations for engineering biology.
- Nature
, 2005
"... Engineered biological systems have been used to manipulate information, construct materials, process chemicals, produce energy, provide food, and help maintain or enhance human health and our environment. Unfortunately, our ability to quickly and reliably engineer biological systems that behave as ..."
Abstract
-
Cited by 132 (2 self)
- Add to MetaCart
Engineered biological systems have been used to manipulate information, construct materials, process chemicals, produce energy, provide food, and help maintain or enhance human health and our environment. Unfortunately, our ability to quickly and reliably engineer biological systems that behave
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
of locations are more important than hierarchies of places. Labour is fundamentally divided in two categories: self-programmable labour, and generic labour. Self-programmable labour is equipped with the ability to retrain itself, and adapt to new tasks, new processes and new sources of information
Autonomous Learning from the Environment
- W. H. Freeman and Company
, 1994
"... Contemporary artificial intelligence systems depend heavily upon their programmers for their knowledge about the world in which they must act. Robotics is only beginning to provide the sensory and motor capabilities that they require when they must interact with the physical environment. And even wh ..."
Abstract
-
Cited by 114 (23 self)
- Add to MetaCart
when such capabilities are in place, or when the interaction with the task environment is symbolic instead of physical, AI systems still need intelligent strategies for exploring their environments to acquire information about them, and to build their internal representations of them. Dr. Shen’s
What you see is what you need.
- http://www.journalofvision.org/ content/3/1/9, doi:10.1167/3.1.9. [PubMed] [Article] Tulving, E.
, 2003
"... We studied the role of attention and task demands for implicit change detection. Subjects engaged in an object sorting task performed in a virtual reality environment, where we changed the properties of an object while the subject was manipulating it. The task assures that subjects are looking at t ..."
Abstract
-
Cited by 66 (5 self)
- Add to MetaCart
se, but the changed object attribute needs to be task relevant at exactly the right times. Also, the simplicity of the used objects indicates that change blindness occurs in situations where the visual short term memory load is minimal, suggesting a potential dissociation between short term memory
Java and the Java Virtual Machine - Definition, Verification, Validation
, 2001
"... State Machines which one may view as code written in an abstract programming language, can be applied to other virtual machines and to other programming languages as well. The target readers are practitioners---programmers, implementors, standardizers, lecturers, students---who need for their work ..."
Abstract
-
Cited by 112 (14 self)
- Add to MetaCart
State Machines which one may view as code written in an abstract programming language, can be applied to other virtual machines and to other programming languages as well. The target readers are practitioners---programmers, implementors, standardizers, lecturers, students---who need for their work
Results 1 - 10
of
1,407