Sciweavers

16513 search results - page 3054 / 3303
» Numerical Analysis Methods
Sort
View
CHI
2011
ACM
14 years 7 months ago
Brick by brick: iterating interventions to bridge the achievement gap with virtual peers
We lay out one strand of a continuing investigation into the development of a virtual peer to help children learn to use “school English” and “school-ratified science talk...
Emilee Rader, Margaret Echelbarger, Justine Cassel...
CHI
2011
ACM
14 years 7 months ago
Evaluating video visualizations of human behavior
Previously, we presented Viz-A-Vis, a VIsualiZation of Activity through computer VISion [17]. Viz-A-Vis visualizes behavior as aggregate motion over observation space. In this pap...
Mario Romero, Alice Vialard, John Peponis, John T....
CICLING
2011
Springer
14 years 7 months ago
Wikipedia Vandalism Detection: Combining Natural Language, Metadata, and Reputation Features
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
B. Thomas Adler, Luca de Alfaro, Santiago Mois&eac...
FASE
2011
Springer
14 years 7 months ago
Theoretical Aspects of Compositional Symbolic Execution
Given a program and an assertion in that program, determining if the assertion can fail is one of the key applications of program analysis. Symbolic execution is a well-known techn...
Dries Vanoverberghe, Frank Piessens
FAST
2011
14 years 7 months ago
Making the Common Case the Only Case with Anticipatory Memory Allocation
We present Anticipatory Memory Allocation (AMA), a new method to build kernel code that is robust to memoryallocation failures. AMA avoids the usual difficulties in handling allo...
Swaminathan Sundararaman, Yupu Zhang, Sriram Subra...
« Prev « First page 3054 / 3303 Last » Next »