We investigate whether erroneous examples in the domain of fractions can help students learn from common errors of other students presented in a computer-based system. Presenting t...
Dimitra Tsovaltzi, Erica Melis, Bruce M. McLaren, ...
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Abstract—Recently, mashups are gaining tremendous popularity as an important Web 2.0 application. Mashups provide end-users with an opportunity to create personalized Web service...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...
Reduction is a common component of many applications, but can often be the limiting factor for parallelization. Previous reduction work has focused on detecting reduction idioms a...
—In this paper, we introduce a local image descriptor, DAISY, which is very efficient to compute densely. We also present an EM-based algorithm to compute dense depth and occlusi...