Sciweavers

4647 search results - page 820 / 930
» Composite Design Patterns
Sort
View
IJFCS
2006
83views more  IJFCS 2006»
14 years 10 months ago
A Simple Alphabet-independent Fm-index
Abstract. We design a succinct full-text index based on the idea of Huffmancompressing the text and then applying the Burrows-Wheeler transform over it. The resulting structure can...
Szymon Grabowski, Gonzalo Navarro, Rafal Przywarsk...
IJMMS
2006
74views more  IJMMS 2006»
14 years 10 months ago
Constructing computer-based tutors that are socially sensitive: Politeness in educational software
Students rated 16 tutorial statements on negative politeness (i.e., how much the tutor ``allows me freedom to make my own decisions'') and positive politeness (i.e., how...
Richard E. Mayer, W. Lewis Johnson, Erin Shaw, Sah...
IJSNET
2006
131views more  IJSNET 2006»
14 years 10 months ago
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
: Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor n...
Muneeb Ali, Zartash Afzal Uzmi
CPHYSICS
2007
65views more  CPHYSICS 2007»
14 years 10 months ago
Plasma etching and feature evolution of organic low-k material by using VicAddress
Plasma process is a highly selective technique exploiting the individual or mixed function of positive ions, electrons, neutral radicals, and photons produced by low temperature p...
T. Makabe, T. Shimada, T. Yagisawa
JOC
2008
92views more  JOC 2008»
14 years 10 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay