Sciweavers

2287 search results - page 370 / 458
» Making it Real
Sort
View
CHI
2006
ACM
16 years 3 months ago
Beyond record and play: backpacks: tangible modulators for kinetic behavior
Digital Manipulatives embed computation in familiar children's toys and provide means for children to design behavior. Some systems use "record and play" as a form ...
Hayes Raffle, Amanda J. Parkes, Hiroshi Ishii, Jos...
243
Voted
POPL
2006
ACM
16 years 3 months ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...
135
Voted
RECOMB
2006
Springer
16 years 3 months ago
New Methods for Detecting Lineage-Specific Selection
Abstract. So far, most methods for identifying sequences under selection based on comparative sequence data have either assumed selectional pressures are the same across all branch...
Adam C. Siepel, Katherine S. Pollard, David Haussl...
247
Voted
VLDB
2006
ACM
171views Database» more  VLDB 2006»
16 years 3 months ago
Grid-partition index: a hybrid method for nearest-neighbor queries in wireless location-based services
Abstract Traditional nearest-neighbor (NN) search is based on two basic indexing approaches: object-based indexing and solution-based indexing. The former is constructed based on t...
Baihua Zheng, Jianliang Xu, Wang-Chien Lee, Dik Lu...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 3 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...