Sciweavers

10568 search results - page 413 / 2114
» Computer Intelligence and Formalization
Sort
View
WSC
1996
15 years 6 months ago
Simulation for computer science majors: a preliminary report
The author is revising and restructuring an existing simulation course designed primarily for senior computer science majors by: 1) developing an integrated set of laboratory exer...
Ruth Silverman
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
CORR
2008
Springer
52views Education» more  CORR 2008»
15 years 4 months ago
Weighted distance transforms generalized to modules and their computation on point lattices
This paper presents the generalization of weighted distances to modules and their computation through the chamfer algorithm on general point lattices. The first part is dedicated ...
Céline Fouard, Robin Strand, Gunilla Borgef...
PUC
2002
80views more  PUC 2002»
15 years 4 months ago
Overcoming the Lack of Screen Space on Mobile Computers
One difficulty for interface design on mobile computers is lack of screen space caused by their small size. This paper describes a small pilot study and two formal experiments tha...
Stephen A. Brewster
PVLDB
2010
116views more  PVLDB 2010»
14 years 11 months ago
Computing Closed Skycubes
In this paper, we tackle the problem of efficient skycube computation. We introduce a novel approach significantly reducing domination tests for a given subspace and the number of...
Chedy Raïssi, Jian Pei, Thomas Kister