Sciweavers

1234 search results - page 221 / 247
» Privacy-preserving Virtual Machine
Sort
View
FECS
2010
236views Education» more  FECS 2010»
14 years 9 months ago
Development of a system for teaching CS1 in C/C++ with Lego NXT robots
This paper describes the development of a system for teaching C/C++ using a LegoTM NXT in a CSI college course on introductory programming. The programming of the NXT robot has be...
Amy Delman, Adiba Ishak, Lawrence Goetz, Mikhail K...
ICA3PP
2011
Springer
13 years 11 months ago
Performance Analysis of Preemption-Aware Scheduling in Multi-cluster Grid Environments
Abstract. Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from ...
Mohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya
ICPR
2006
IEEE
16 years 24 days ago
Bayesian Imitation of Human Behavior in Interactive Computer Games
Modern interactive computer games provide the ability to objectively record complex human behavior, offering a variety of interesting challenges to the pattern-recognition communi...
Bernard Gorman, Christian Bauckhage, Christian Thu...
KDD
2005
ACM
163views Data Mining» more  KDD 2005»
16 years 3 days ago
Data Sparsity Issues in the Collaborative Filtering Framework
Abstract. With the amount of available information on the Web growing rapidly with each day, the need to automatically filter the information in order to ensure greater user effici...
Miha Grcar, Dunja Mladenic, Blaz Fortuna, Marko Gr...
ICFP
2005
ACM
15 years 11 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...