Sciweavers

1369 search results - page 273 / 274
» A Practical Implementation of the Timing Attack
Sort
View
112
Voted
IJRR
2010
159views more  IJRR 2010»
14 years 5 months ago
Vision-guided Robot System for Picking Objects by Casting Shadows
We present a complete vision guided robot system for model based 3D pose estimation and picking of singulated 3D objects. Our system employs a novel vision sensor consisting of a ...
Amit Agrawal, Yu Sun, John Barnwell, Ramesh Raskar
112
Voted
TASE
2010
IEEE
14 years 5 months ago
A Semantic Feature Model in Concurrent Engineering
Concurrent engineering (CE) is a methodology applied to product lifecycle development so that high quality, well designed products can be provided at lower prices and in less time....
Yong-Jin Liu, Kam-Lung Lai, Gang Dai, Matthew Ming...
CSEE
2011
Springer
14 years 1 months ago
Pex4Fun: Teaching and learning computer science via social gaming
Pex4Fun (http://www.pexforfun.com/)from Microsoft Research is a web-based serious gaming environment for teaching computer science. Pex4Fun can be used to teach and learn computer...
Nikolai Tillmann, Jonathan de Halleux, Tao Xie
RECOMB
2011
Springer
14 years 1 months ago
Rich Parameterization Improves RNA Structure Prediction
Motivation. Current approaches to RNA structure prediction range from physics-based methods, which rely on thousands of experimentally-measured thermodynamic parameters, to machin...
Shay Zakov, Yoav Goldberg, Michael Elhadad, Michal...
87
Voted
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 1 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...