Sciweavers

663 search results - page 45 / 133
» Applying Two New Methods to the Teaching of Computer Archite...
Sort
View
PERVASIVE
2007
Springer
15 years 6 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
SIGCSE
2002
ACM
202views Education» more  SIGCSE 2002»
14 years 11 months ago
A tutorial program for propositional logic with human/computer interactive learning
This paper describes a tutorial program that serves a double role as an educational tool and a research environment. First, it introduces students to fundamental concepts of propo...
Stacy Lukins, Alan Levicki, Jennifer Burg
CVPR
2004
IEEE
16 years 1 months ago
Automatic Cascade Training with Perturbation Bias
Face detection methods based on a cascade architecture have demonstrated fast and robust performance. Cascade learning is aided by the modularity of the architecture in which node...
Jie Sun, James M. Rehg, Aaron F. Bobick
CLOUD
2010
ACM
15 years 4 months ago
Comet: batched stream processing for data intensive distributed computing
Batched stream processing is a new distributed data processing paradigm that models recurring batch computations on incrementally bulk-appended data streams. The model is inspired...
Bingsheng He, Mao Yang, Zhenyu Guo, Rishan Chen, B...
ESOP
2008
Springer
15 years 1 months ago
Verification of Higher-Order Computation: A Game-Semantic Approach
Abstract. We survey recent developments in an approach to the verification of higher-order computation based on game semantics. Higherorder recursion schemes are in essence (progra...
C.-H. Luke Ong