Syncing up with the iKid: Portrait of seven high school teacher leaders transforming the American high school through a digital conversion of teaching and learning.
Energy consumption is a limiting constraint for both embedded and high performance systems. CPU-core, caches and memory contribute a large fraction of energy consumption in most computing systems. As a result, reducing the energy consumption in these components can significantly reduce the system's overall energy consumption. However, applying multiple independent power management policies in the system (one for each component) may interfere with each other and in some occasions increase the
This dissertation considers the way in which the figure of fashion expands and complicates the field of literary modernism. My project treats "fashion" as more than just clothing and other bodily adornment, broadening it to include certain spaces, locations, and objects organized by social hierarchies of performance and display. I focus on the way in which characters---often in the texts of authors on the margins of mainstream modernism---use fashionable dress and the manipulation of social
The impact of computer security policy content elements on mitigating phishing attacks.The impact of computer security policy content elements on mitigating phishing attacks. available on December 22 2014 from Amazon for 69.00
Modern, complex software systems (e-commerce, IT, critical infrastructures, etc.) are increasingly required to continue operation in the face of change, to self-adapt to accommodate shifting user priorities, resource variability, changing environments, and component failures. While manual oversight benefits from global problem contexts and flexible policies, human operators are costly and prone to error. Low-level, embedded mechanisms (exceptions, time-outs, etc.) are effective and timely for