Sciweavers

ANOR
2008
127views more  ANOR 2008»
13 years 4 months ago
Computer science and decision theory
This paper reviews applications in computer science that decision theorists have addressed for years, discusses the requirements posed by these applications that place great strai...
Fred S. Roberts
ALGORITHMICA
2007
118views more  ALGORITHMICA 2007»
13 years 4 months ago
External-Memory Algorithms for Processing Line Segments in Geographic Information Systems
d abstract) Lars Arge1 , Darren Erik Vengroff2 , and Jeffrey Scott Vitter3 1 BRICS† , Department of Computer Science, University of Aarhus, Aarhus, Denmark 2 Department of Comp...
Lars Arge, Darren Erik Vengroff, Jeffrey Scott Vit...
ACTA
2010
109views more  ACTA 2010»
13 years 4 months ago
On regular temporal logics with past
The IEEE standardized Property Specification Language, PSL for short, extends the well-known linear-time temporal logic LTL with so-called semi-extended regular expressions. PSL an...
Christian Dax, Felix Klaedtke, Martin Lange
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
13 years 4 months ago
Internationalization of computer science education
Internationalization of computer science education involves incorporating awareness, knowledge and skills of professional life in a global environment. Through an NSF CPATH grant1...
Sarah A. Douglas, Arthur M. Farley, Ginnie Lo, And...
SIGCSE
2010
ACM
203views Education» more  SIGCSE 2010»
13 years 4 months ago
An approach to integrating ICTD projects into an undergraduate curriculum
Applying information and communication technologies to development (ICTD) is emerging as an interesting and motivating research area in computer science and engineering. It spans ...
Richard J. Anderson, Ruth E. Anderson, Gaetano Bor...
CATA
2010
13 years 4 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad
SODA
1992
ACM
123views Algorithms» more  SODA 1992»
13 years 5 months ago
Computing Minimal Spanning Subgraphs in Linear Time
Let P be a property of undirected graphs. We consider the following problem: given a graph G that has property P, nd a minimal spanning subgraph of G with property P. We describe ...
Xiaofeng Han, Pierre Kelsen, Vijaya Ramachandran, ...
SNPD
2003
13 years 5 months ago
Telematics: A Distinctive Discipline
With the advance of knowledge, new disciplines are succesively identified. Computer Science has its roots in Babbage and others, but was identified as a separate discipline duri...
Carlos Delgado Kloos, Arturo Azorra Soloña
PUK
2003
13 years 5 months ago
Modeling in an Architectural Variability Description Language
In order to handle the large amount of variability in product families, automated product derivation support is desirable. To make automated product derivation possible one importa...
Theo Dirk Meijler, Silvie Schoenmaker, Egbert de R...
PUK
2003
13 years 5 months ago
Towards Evolving Configuration Models
Thorsten Krebs, Lothar Hotz, K. Christoph Ranze, G...