Sciweavers

44 search results - page 4 / 9
» From PIMs to PSMs
Sort
View
STACS
1999
Springer
15 years 1 months ago
Costs of General Purpose Learning
Leo Harrington surprisingly constructed a machine which can learn any computable function f according to the following criterion (called Bc∗ -identification). His machine, on t...
John Case, Keh-Jiann Chen, Sanjay Jain
IBMSJ
1998
81views more  IBMSJ 1998»
14 years 9 months ago
T Spaces
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Peter Wyckoff, Stephen W. McLaughry, Tobin J. Lehm...
PUC
2010
99views more  PUC 2010»
14 years 7 months ago
Easy on that trigger dad: a study of long term family photo retrieval
We examine the effects of new technologies for digital photography on people’s longer term storage and access to collections of personal photos. We report an empirical study of p...
Steve Whittaker, Ofer Bergman, Paul Clough
97
Voted
IWOCA
2010
Springer
232views Algorithms» more  IWOCA 2010»
14 years 4 months ago
Computing Role Assignments of Proper Interval Graphs in Polynomial Time
A homomorphism from a graph G to a graph R is locally surjective if its restriction to the neighborhood of each vertex of G is surjective. Such a homomorphism is also called an R-r...
Pinar Heggernes, Pim van 't Hof, Daniël Paulu...
FDL
2004
IEEE
15 years 1 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini