Search For:

Displaying 1-14 out of 14 total
Enhancing the Core Scientific Metadata Model to Incorporate Derived Data
Found in: eScience, IEEE International Conference on
By Erica Yang, Brian Matthews, Michael Wilson
Issue Date:December 2010
pp. 145-152
The Core Scientific MetaData model (CSMD) is used by large scientific facilities to catalogue scientific data. The current version provides support to experimental scientists to access their raw data, facility managers for accounting for facility usage and...
 
Enforcing Scientific Data Sharing Agreements
Found in: eScience, IEEE International Conference on
By Michael Wilson,Shirley Crompton,Brian Matthews,Alexey Orlov
Issue Date:December 2011
pp. 271-278
There are currently strong drivers from funding bodies for the scientific community to both preserve data and make it available more widely, whilst ensuring that privacy and confidentiality are maintained. Institutional data sharing policies will be requir...
 
Partial Program Admission
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Michael Wilson, Ron Cytron, Jonathan Turner
Issue Date:April 2009
pp. 295-304
Real-time systems on non-preemptive platforms require a means of bounding the execution time of programs for admission purposes. Worst-Case Execution Time (WCET) is most commonly used to bound program execution time. While bounding a program’s WCET statica...
 
Contracts as Trust Substitutes in Collaborative Business
Found in: Computer
By Alvaro Arenas, Michael Wilson
Issue Date:July 2008
pp. 80-83
Automated contract management can mitigate the risks of interoperating systems.
 
Bridging the Gap between Legal and Technical Contracts
Found in: IEEE Internet Computing
By Alvaro Arenas, Michael Wilson, Shirley Crompton, Dana Cojocarasu, Tobias Mahler, Lutz Schubert
Issue Date:March 2008
pp. 13-19
Two or more parties typically establish a business relationship using a contract, but a large gap still exists between the provisions of contracts produced by lawyers and the details of computer security and performance addressed by technologists. Some con...
 
Adaptive Business Protocol Support in Service Oriented B2B Collaborations
Found in: Enabling Technologies, IEEE International Workshops on
By Adomas Svirskas, Justinas Bedzinskas, Bob Roberts, Ioannis Ignatiadis, Michael Wilson
Issue Date:June 2006
pp. 261-262
Service Oriented Architecture approach in general and the Web services technology in particular are becoming more and more important in modern networked organisations and Virtual Organisations (VO). However, it is not enough to have the business functional...
   
On Satisfying Timing and Resource Constraints in Distributed Multimedia Systems
Found in: Multimedia Computing and Systems, International Conference on
By Costas Mourlas, David Duce, Michael Wilson
Issue Date:June 1999
pp. 16
In this paper, we present a new synchronization strategy for multimedia applications executed in a distributed environment. This strategy makes the timing properties of the system and the quality of the media presentations predictable since one is able to ...
 
Enhanced Interaction Styles for User Interfaces
Found in: IEEE Computer Graphics and Applications
By Michael Wilson, Anthony Conway
Issue Date:March 1991
pp. 79-90
<p>Seven precompetitive research projects on user interfaces in Europe are described. The projects considered are Hufit, the Comett I Project, the Elusive Office Project, the Euroworkstation Project, Acord, MMI/sup 2/, and Xtra. The integration of us...
 
Inference of the Genetic Network Regulating Lateral Root Initiation in Arabidopsis thaliana
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Charlie Hodgman, Daniele Muraro, Helen Byrne, Ive De Smet, John King, Malcolm Bennett, Michael Wilson, Ute Vob
Issue Date:January 2013
pp. 50-60
Regulation of gene expression is crucial for organism growth, and it is one of the challenges in systems biology to reconstruct the underlying regulatory biological networks from transcriptomic data. The formation of lateral roots in Arabidopsis thaliana i...
     
A remotely accessible network processor-based router for network experimentation
Found in: Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '08)
By Charlie Wiseman, David Zar, Fred Kuhns, Jing Lu, John DeHart, Jonathan Turner, Jyoti Parwatikar, Ken Wong, Mart Haitjema, Michael Wilson, Michela Becchi, Patrick Crowley, Ritun Patney, Shakir James
Issue Date:November 2008
pp. 77-81
Over the last decade, programmable Network Processors (NPs) have become widely used in Internet routers and other network components. NPs enable rapid development of complex packet processing functions as well as rapid response to changing requirements. In...
     
Supercharging planetlab: a high performance, multi-application, overlay network platform
Found in: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '07)
By Amy Freestone, Brandon Heller, Charles Wiseman, David Zar, Fred Kuhns, Jing Lu, John DeHart, John Lockwood, Jonathan S. Turner, Michael Wilson, Patrick Crowley, Sailesh Kumar
Issue Date:August 2007
pp. 652-652
In recent years, overlay networks have become an important vehicle for delivering Internet applications. Overlay network nodes are typically implemented using general purpose servers or clusters. We investigate the performance benefits of more integrated a...
     
Knowledge-based design of graphical responses
Found in: Proceedings of the 1st international conference on Intelligent user interfaces (IUI '93)
By Helen Chappel, Michael Wilson
Issue Date:January 1993
pp. 29-36
Simulation models of a number of computer architectures have been created using HASE,a Hierarchical Computer Architecture design and Simulation Environment,and automatially translated into WebHASE... and JavaHASE applets which can be accessed via the WWW.T...
     
Approximate modelling of cognitive activity: towards an expert system design aid
Found in: Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface (CHI '87)
By Allan MacLean, Michael Wilson, Phil Barnard
Issue Date:April 1987
pp. 225
Constructs from theoretical psychology can be used to decompose the representational and processing resources of cognition. The decomposition supports “cognitive task analysis” through which user performance can be related to the functioning of...
     
Measuring operating system performance on modern micro-processors
Found in: Proceedings of the 1992 ACM SIGMETRICS joint international conference on Computer performance modelling, measurement and evaluation (SIGMETRICS '86/PERFORMANCE '86)
By Michael Wilson, Rami R. Razouk, Terri Stewart
Issue Date:May 1986
pp. 275-281
The use of micro-processors and commercial operating systems in real-time applications demands a good understanding of factors which influence software performance. Advances in micro-processor design (e.g. pipelining) make performance prediction based on i...
     
 1