• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 19,299
Next 10 →

LogP: Towards a Realistic Model of Parallel Computation

by David Culler , Richard Karp , David Patterson, Abhijit Sahay, Klaus Erik Schauser, Eunice Santos, Ramesh Subramonian, Thorsten von Eicken , 1993
"... A vast body of theoretical research has focused either on overly simplistic models of parallel computation, notably the PRAM, or overly specific models that have few representatives in the real world. Both kinds of models encourage exploitation of formal loopholes, rather than rewarding developme ..."
Abstract - Cited by 560 (15 self) - Add to MetaCart
development of techniques that yield performance across a range of current and future parallel machines. This paper offers a new parallel machine model, called LogP, that reflects the critical technology trends underlying parallel computers. It is intended to serve as a basis for developing fast, portable

Studying information technology in organizations: Research approaches and assumptions

by Wanda J. Orlikowski, Jack J. Baroudi - Information Systems Research , 1991
"... We examined 155 information systems research articles published from 1983 to 1988 and found that although this research is not rooted in a single overarching theoretical perspective, it does exhibit a single set of philosophical assumptions regarding the nature of the phenomena studied by informatio ..."
Abstract - Cited by 463 (2 self) - Add to MetaCart
of the relationships between information technology, people, and organizations. In this paper, we present two additional research philosophies for consideration-the interpretive and the critical-and for each we provide empirical examples to illustrate how they are used. We conclude by suggesting that much can

Evaluation of Release Consistent Software Distributed Shared Memory on Emerging Network Technology

by Sandhya Dwarkadas, Pete Keleher, Alan L. Cox, Willy Zwaenepoel
"... We evaluate the effect of processor speed, network characteristics, and software overhead on the performance of release-consistent software distributed shared memory. We examine five different protocols for implementing release consistency: eager update, eager invalidate, lazy update, lazy invalidat ..."
Abstract - Cited by 467 (43 self) - Add to MetaCart
independent of the protocol used. Medium-grained applications, such as Water, can achieve good performance, but the choice of protocol is critical. For sixteen processors, the best protocol, lazy hybrid, performed more than three times better than the worst, the eager update. Fine-grained applications

The FERET evaluation methodology for face recognition algorithms

by P. Jonathon Phillips, Hyeonjoon Moon, Syed A. Rizvi, Patrick J. Rauss - In (a) Example 1 (b) Example 1 (c) Right ear) (d) Mirroed Left ear
"... AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial i ..."
Abstract - Cited by 1116 (26 self) - Add to MetaCart
AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial

A Metrics Suite for Object Oriented Design

by Shyam R. Chidamber , Chris F. Kemerer , 1994
"... Given the central role that software development plays in the delivery and application of information technology, managers are increasingly focusing on process improvement in the software development area. This demand has spurred the provision of a number of new and/or improved approaches to softwa ..."
Abstract - Cited by 1108 (3 self) - Add to MetaCart
Given the central role that software development plays in the delivery and application of information technology, managers are increasingly focusing on process improvement in the software development area. This demand has spurred the provision of a number of new and/or improved approaches

Advanced Architectures and Critical Technologies for

by unknown authors
"... Engineering researchers in the areas of Advanced Architectures and Critical Technologies for Exascale Computing. Multi institutional proposals with cohesive emphasis on transformational discoveries that address key barriers on the path to exascale computing are encouraged. Partnerships among academi ..."
Abstract - Add to MetaCart
Engineering researchers in the areas of Advanced Architectures and Critical Technologies for Exascale Computing. Multi institutional proposals with cohesive emphasis on transformational discoveries that address key barriers on the path to exascale computing are encouraged. Partnerships among

Technological pedagogical content knowledge: A framework for integrating technology in teacher knowledge.

by M J Koehler , P Mishra - Teachers College Record, , 2006
"... Abstract This paper describes a framework for teacher knowledge for technology integration called technological pedagogical content knowledge (originally TPCK, now known as TPACK, or technology, pedagogy, and content knowledge). This framework builds on Lee Shulman's construct of pedagogical c ..."
Abstract - Cited by 420 (19 self) - Add to MetaCart
content knowledge (PCK) to include technology knowledge. The development of TPACK by teachers is critical to effective teaching with technology. The paper begins with a brief introduction to the complex, illstructured nature of teaching. The nature of technologies (both analog and digital) is considered

Critical Technology: Proc.

by Lee, Liebowitz, Chae (Eds.), Zenya Koono, Hui Chen, Behrouz H. Far , 1996
"... This paper describes a systematic acquisition method of design knowledge. Systematic knowledge acquisition is possible based on a systematic design knowledge structure in a systematic work process of well matured software development organizations. The basis of the work process, design and design in ..."
Abstract - Add to MetaCart
This paper describes a systematic acquisition method of design knowledge. Systematic knowledge acquisition is possible based on a systematic design knowledge structure in a systematic work process of well matured software development organizations. The basis of the work process, design and design information, cognitive scienti#c views are explained and veri #ed quantitatively. Industrial practice on documentation is also evaluated, and the use of documents is rationalized. Consequently, a systematic way of using documents is explained. Keywords: Systematic Knowledge Acquisition, Hierarchical Work Process, Design Knowledge, Expert System 1. INTRODUCTION Knowledge based systems have opened a new era of using human knowledge. But it is said that they bring along two serious problems. One is the lack of a method of systematic acquisition of human experts' knowledge, and the other is the lack of a method of systematic construction of an expert system for reusing the knowledge. If systemat...

Learning: The Critical Technology ®

by Carmen Zeider, Doug Wilmsmeyer, David Forman, Cover Design Dave Noot, Rey Umali
"... permission, except for brief quotations in review or professional work. All programs and products named in this document are the registered trademarks of their respective companies. ..."
Abstract - Add to MetaCart
permission, except for brief quotations in review or professional work. All programs and products named in this document are the registered trademarks of their respective companies.

Destinations and Critical Technology Needs

by Kenneth Markel, Associate Director, Benefits Vs. Rd, D Costs, Reach Consensus
"... Review performance & cost targets ..."
Abstract - Add to MetaCart
Review performance & cost targets
Next 10 →
Results 1 - 10 of 19,299
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University