Sciweavers

5241 search results - page 633 / 1049
» Embedded Programming with C
Sort
View
CSFW
2008
IEEE
15 years 6 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
AAAI
2006
15 years 6 months ago
Introductory Computer Science with Robots
Starting in the fall of 2005 our department began a large-scale effort to incorporate hands-on robotics in many of our courses, including our introductory computer science sequenc...
Debra T. Burhans, R. Mark Meyer, Patricia VanVerth...
APBC
2003
138views Bioinformatics» more  APBC 2003»
15 years 6 months ago
A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases
The development of high-throughput genome sequencing and protein structure determination techniques have provided researchers with a wealth of biological data. Integrated analysis...
William M. Shui, Raymond K. Wong, Stephen C. Graha...
CCR
2008
83views more  CCR 2008»
15 years 4 months ago
The CoNEXT shadow TPC
This paper claims that Shadow Technical Program Committee (TPC) should be organized on a regular basis for attractive conferences in the networking domain. It helps ensuring that ...
Olivier Bonaventure, Augustin Chaintreau, Laurent ...
AUTOMATICA
2006
97views more  AUTOMATICA 2006»
15 years 4 months ago
Receding horizon control applied to optimal mine planning
In this paper we show that the problem of optimal mine planning can be cast in the framework of receding horizon control. Traditional formulations of this problem have cast it in ...
Graham C. Goodwin, María M. Seron, Richard ...