Sciweavers

424 search results - page 61 / 85
» Balanced Incomplete Factorization
Sort
View
123
Voted
ITICSE
2003
ACM
15 years 7 months ago
Using lab exams to ensure programming practice in an introductory programming course
The high variability of students’ backgrounds typically found in introductory programming courses creates additional difficulties to foster motivation and ensure the desired co...
João Paulo Barros, Luís Estevens, Ru...
129
Voted
HIPC
2003
Springer
15 years 7 months ago
Thread Migration/Checkpointing for Type-Unsafe C Programs
Thread migration/checkpointing is becoming indispensable for load balancing and fault tolerance in high performance computing applications, and its success depends on the migration...
Hai Jiang, Vipin Chaudhary
124
Voted
ISCIS
2003
Springer
15 years 7 months ago
Multiple Description Coding for Image Data Hiding in the Spatial Domain
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
Mohsen Ashourian, Yo-Sung Ho
100
Voted
DATE
2010
IEEE
160views Hardware» more  DATE 2010»
15 years 7 months ago
IVF: Characterizing the vulnerability of microprocessor structures to intermittent faults
—With the advancement of CMOS manufacturing process to nano-scale, future shipped microprocessors will be increasingly vulnerable to intermittent faults. Quantitatively character...
Songjun Pan, Yu Hu, Xiaowei Li
110
Voted
HICSS
2002
IEEE
85views Biometrics» more  HICSS 2002»
15 years 6 months ago
Just What Do the Youth of Today Want? Technology Appropriation by Young People
What do young people want from information and communication technology? Why do they adopt some technologies but reject others? What roles do mobile technologies play in their liv...
Jenny M. Carroll, Steve Howard, Frank Vetere, Jane...