Sciweavers

496 search results - page 62 / 100
» Generation Gaps Revisited
Sort
View
CHI
2000
ACM
15 years 4 months ago
Instructional interventions in computer-based tutoring: differential impact on learning time and accuracy
We can reliably build “second generation” intelligent computer tutors that are approximately half as effective as human tutors. This paper evaluates two interface enhancements...
Albert T. Corbett, Holly J. Trask
DAC
1999
ACM
15 years 4 months ago
Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration
This paper presents a novel approach for synthesis of analog systems from behavioral VHDL-AMS specifications. We implemented this approach in the VASE behavioral-synthesis tool. ...
Alex Doboli, Adrián Núñez-Ald...
DATE
2004
IEEE
109views Hardware» more  DATE 2004»
15 years 3 months ago
RTL Processor Synthesis for Architecture Exploration and Implementation
Architecture description languages are widely used to perform architecture exploration for application-driven designs, whereas the RT-level is the commonly accepted level for hard...
Oliver Schliebusch, Anupam Chattopadhyay, Rainer L...
BIRD
2008
Springer
158views Bioinformatics» more  BIRD 2008»
15 years 1 months ago
A Computational Method for Reconstructing Gapless Metabolic Networks
Abstract. We propose a computational method for reconstructing metabolic networks. The method utilizes optimization techniques and graph traversal algorithms to discover a set of b...
Esa Pitkänen, Ari Rantanen, Juho Rousu, Esko ...
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 1 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo