Sciweavers

701 search results - page 88 / 141
» Costs Are Expensive!
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 4 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
LICS
2005
IEEE
15 years 4 months ago
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics
Three-valued models, in which properties of a system are either true, false or unknown, have recently been advocated as a better representation for reactive program abstractions g...
Patrice Godefroid, Michael Huth
AIED
2005
Springer
15 years 4 months ago
The Assistment Builder: A Rapid Development Tool for ITS
Intelligent Tutoring Systems are notoriously costly to construct [1], and require PhD level experience in cognitive science and rule based programming. The goal of this research wa...
Terrence E. Turner, Michael A. Macasek, Goss Nuzzo...
DALT
2005
Springer
15 years 4 months ago
Resource-Bounded Belief Revision and Contraction
Agents need to be able to change their beliefs; in particular, they should be able to contract or remove a certain belief in order to restore consistency to their set of beliefs, a...
Natasha Alechina, Mark Jago, Brian Logan
ISMIR
2005
Springer
154views Music» more  ISMIR 2005»
15 years 4 months ago
Exploiting the Tradeoff Between Precision and Cpu-Time to Speed Up Nearest Neighbor Search
We describe a recursive algorithm to quickly compute the N nearest neighbors according to a similarity measure in a metric space. The algorithm exploits an intrinsic property of a...
Pierre Roy, Jean-Julien Aucouturier, Franço...