Sciweavers

11394 search results - page 2116 / 2279
» Error-Correcting Data Structures
Sort
View
138
Voted
AIED
2007
Springer
15 years 9 months ago
Assessing Learning in a Peer-Driven Tutoring System
In many intelligent tutoring systems, a detailed model of the task domain is constructed and used to provide students with assistance and direction. Reciprocal tutoring systems, h...
Ari Bader-Natal, Jordan B. Pollack
152
Voted
CCS
2007
ACM
15 years 9 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
138
Voted
CIVR
2007
Springer
164views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Inducing a perceptual relevance shape classifier
In this paper, we develop a system to classify the outputs of image segmentation algorithms as perceptually relevant or perceptually irrelevant with respect to human perception. T...
Victoria J. Hodge, John P. Eakins, James Austin
DRM
2007
Springer
15 years 9 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
LCTRTS
2007
Springer
15 years 9 months ago
External memory page remapping for embedded multimedia systems
As memory speeds and bus capacitances continue to rise, external memory bus power will make up an increasing portion of the total system power budget for system-on-a-chip embedded...
Ke Ning, David R. Kaeli
« Prev « First page 2116 / 2279 Last » Next »