Sciweavers

708 search results - page 22 / 142
» Computational Law
Sort
View
CONSTRAINTS
2010
75views more  CONSTRAINTS 2010»
14 years 6 months ago
Redundant modeling in permutation weighted constraint satisfaction problems
Yat Chiu Law, Jimmy Ho-Man Lee, May H. C. Woo
NSDI
2008
14 years 11 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
AUTOMATICA
2008
106views more  AUTOMATICA 2008»
14 years 9 months ago
Synchronizing linear systems via partial-state coupling
A basic result in synchronization of linear systems via output coupling is presented. For identical discrete-time linear systems that are detectable from their outputs and neutral...
S. Emre Tuna
CHI
2006
ACM
15 years 10 months ago
Targeted steering motions
In this paper we investigate targeted steering motions. Fitts' law is a very successful model to explain human targeting behavior, while the Steering law has been used to mod...
Sergey Kulikov, Wolfgang Stürzlinger
ENTCS
2008
94views more  ENTCS 2008»
14 years 9 months ago
From Reversible to Irreversible Computations
In this paper we study the relation between reversible and irreversible computation applicable to different models of computation -- here we are considering classical and quantum ...
Alexander S. Green, Thorsten Altenkirch