Results 1 - 10
of
19,299
LogP: Towards a Realistic Model of Parallel Computation
, 1993
"... A vast body of theoretical research has focused either on overly simplistic models of parallel computation, notably the PRAM, or overly specific models that have few representatives in the real world. Both kinds of models encourage exploitation of formal loopholes, rather than rewarding developme ..."
Abstract
-
Cited by 560 (15 self)
- Add to MetaCart
development of techniques that yield performance across a range of current and future parallel machines. This paper offers a new parallel machine model, called LogP, that reflects the critical technology trends underlying parallel computers. It is intended to serve as a basis for developing fast, portable
Studying information technology in organizations: Research approaches and assumptions
- Information Systems Research
, 1991
"... We examined 155 information systems research articles published from 1983 to 1988 and found that although this research is not rooted in a single overarching theoretical perspective, it does exhibit a single set of philosophical assumptions regarding the nature of the phenomena studied by informatio ..."
Abstract
-
Cited by 463 (2 self)
- Add to MetaCart
of the relationships between information technology, people, and organizations. In this paper, we present two additional research philosophies for consideration-the interpretive and the critical-and for each we provide empirical examples to illustrate how they are used. We conclude by suggesting that much can
Evaluation of Release Consistent Software Distributed Shared Memory on Emerging Network Technology
"... We evaluate the effect of processor speed, network characteristics, and software overhead on the performance of release-consistent software distributed shared memory. We examine five different protocols for implementing release consistency: eager update, eager invalidate, lazy update, lazy invalidat ..."
Abstract
-
Cited by 467 (43 self)
- Add to MetaCart
independent of the protocol used. Medium-grained applications, such as Water, can achieve good performance, but the choice of protocol is critical. For sixteen processors, the best protocol, lazy hybrid, performed more than three times better than the worst, the eager update. Fine-grained applications
The FERET evaluation methodology for face recognition algorithms
- In (a) Example 1 (b) Example 1 (c) Right ear) (d) Mirroed Left ear
"... AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial i ..."
Abstract
-
Cited by 1116 (26 self)
- Add to MetaCart
AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial
A Metrics Suite for Object Oriented Design
, 1994
"... Given the central role that software development plays in the delivery and application of information technology, managers are increasingly focusing on process improvement in the software development area. This demand has spurred the provision of a number of new and/or improved approaches to softwa ..."
Abstract
-
Cited by 1108 (3 self)
- Add to MetaCart
Given the central role that software development plays in the delivery and application of information technology, managers are increasingly focusing on process improvement in the software development area. This demand has spurred the provision of a number of new and/or improved approaches
Advanced Architectures and Critical Technologies for
"... Engineering researchers in the areas of Advanced Architectures and Critical Technologies for Exascale Computing. Multi institutional proposals with cohesive emphasis on transformational discoveries that address key barriers on the path to exascale computing are encouraged. Partnerships among academi ..."
Abstract
- Add to MetaCart
Engineering researchers in the areas of Advanced Architectures and Critical Technologies for Exascale Computing. Multi institutional proposals with cohesive emphasis on transformational discoveries that address key barriers on the path to exascale computing are encouraged. Partnerships among
Technological pedagogical content knowledge: A framework for integrating technology in teacher knowledge.
- Teachers College Record,
, 2006
"... Abstract This paper describes a framework for teacher knowledge for technology integration called technological pedagogical content knowledge (originally TPCK, now known as TPACK, or technology, pedagogy, and content knowledge). This framework builds on Lee Shulman's construct of pedagogical c ..."
Abstract
-
Cited by 420 (19 self)
- Add to MetaCart
content knowledge (PCK) to include technology knowledge. The development of TPACK by teachers is critical to effective teaching with technology. The paper begins with a brief introduction to the complex, illstructured nature of teaching. The nature of technologies (both analog and digital) is considered
Critical Technology: Proc.
, 1996
"... This paper describes a systematic acquisition method of design knowledge. Systematic knowledge acquisition is possible based on a systematic design knowledge structure in a systematic work process of well matured software development organizations. The basis of the work process, design and design in ..."
Abstract
- Add to MetaCart
This paper describes a systematic acquisition method of design knowledge. Systematic knowledge acquisition is possible based on a systematic design knowledge structure in a systematic work process of well matured software development organizations. The basis of the work process, design and design information, cognitive scienti#c views are explained and veri #ed quantitatively. Industrial practice on documentation is also evaluated, and the use of documents is rationalized. Consequently, a systematic way of using documents is explained. Keywords: Systematic Knowledge Acquisition, Hierarchical Work Process, Design Knowledge, Expert System 1. INTRODUCTION Knowledge based systems have opened a new era of using human knowledge. But it is said that they bring along two serious problems. One is the lack of a method of systematic acquisition of human experts' knowledge, and the other is the lack of a method of systematic construction of an expert system for reusing the knowledge. If systemat...
Learning: The Critical Technology ®
"... permission, except for brief quotations in review or professional work. All programs and products named in this document are the registered trademarks of their respective companies. ..."
Abstract
- Add to MetaCart
permission, except for brief quotations in review or professional work. All programs and products named in this document are the registered trademarks of their respective companies.
Results 1 - 10
of
19,299