Sciweavers

908 search results - page 50 / 182
» Additional methods when using email for teaching
Sort
View
CODES
2006
IEEE
15 years 10 months ago
A buffer-sizing algorithm for networks on chip using TDMA and credit-based end-to-end flow control
When designing a System-on-Chip (SoC) using a Networkon-Chip (NoC), silicon area and power consumption are two key elements to optimize. A dominant part of the NoC area and power ...
Martijn Coenen, Srinivasan Murali, Andrei Radulesc...
BMCBI
2006
102views more  BMCBI 2006»
15 years 4 months ago
Protein secondary structure prediction for a single-sequence using hidden semi-Markov models
Background: The accuracy of protein secondary structure prediction has been improving steadily towards the 88% estimated theoretical limit. There are two types of prediction algor...
Zafer Aydin, Yucel Altunbasak, Mark Borodovsky
ICDM
2008
IEEE
137views Data Mining» more  ICDM 2008»
15 years 10 months ago
Iterative Set Expansion of Named Entities Using the Web
Set expansion refers to expanding a partial set of “seed” objects into a more complete set. One system that does set expansion is SEAL (Set Expander for Any Language), which e...
Richard C. Wang, William W. Cohen
CORR
2010
Springer
286views Education» more  CORR 2010»
15 years 1 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
SIGCSE
2002
ACM
202views Education» more  SIGCSE 2002»
15 years 3 months ago
A tutorial program for propositional logic with human/computer interactive learning
This paper describes a tutorial program that serves a double role as an educational tool and a research environment. First, it introduces students to fundamental concepts of propo...
Stacy Lukins, Alan Levicki, Jennifer Burg