Sciweavers

2838 search results - page 560 / 568
» Interactions in Online Education
Sort
View
ICIP
2009
IEEE
15 years 10 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
TEI
2010
ACM
179views Hardware» more  TEI 2010»
15 years 4 months ago
Feeling the beat where it counts: fostering multi-limb rhythm skills with the haptic drum kit
This paper introduces a tool known as the Haptic Drum Kit, which employs four computer-controlled vibrotactile devices, one attached to each wrist and ankle. In the applications d...
Simon Holland, Anders J. Bouwer, Mathew Dalgelish,...
ICEIS
2009
IEEE
15 years 4 months ago
Semi-supervised Information Extraction from Variable-length Web-page Lists
We propose two methods for constructing automated programs for extraction of information from a class of web pages that are very common and of high practical significance - varia...
Daniel Nikovski, Alan Esenther, Akihiro Baba
IEEEPACT
2009
IEEE
15 years 4 months ago
Polyhedral-Model Guided Loop-Nest Auto-Vectorization
Abstract—Optimizing compilers apply numerous interdependent optimizations, leading to the notoriously difficult phase-ordering problem — that of deciding which transformations...
Konrad Trifunovic, Dorit Nuzman, Albert Cohen, Aya...
QOSA
2009
Springer
15 years 4 months ago
Adaptive Application Composition in Quantum Chemistry
Abstract. Component interfaces, as advanced by the Common Component Architecture (CCA), enable easy access to complex software packages for high-performance scientific computing. ...
Li Li, Joseph P. Kenny, Meng-Shiou Wu, Kevin A. Hu...