Sciweavers

1222 search results - page 136 / 245
» Some Results on Directable Automata
Sort
View
IJMMS
2006
74views more  IJMMS 2006»
14 years 10 months ago
Constructing computer-based tutors that are socially sensitive: Politeness in educational software
Students rated 16 tutorial statements on negative politeness (i.e., how much the tutor ``allows me freedom to make my own decisions'') and positive politeness (i.e., how...
Richard E. Mayer, W. Lewis Johnson, Erin Shaw, Sah...
JACM
2007
121views more  JACM 2007»
14 years 10 months ago
(Almost) Tight bounds and existence theorems for single-commodity confluent flows
A flow of a commodity is said to be confluent if at any node all the flow of the commodity leaves along a single edge. In this paper we study single-commodity confluent flow pro...
Jiangzhuo Chen, Robert D. Kleinberg, Lászl&...
JAR
2002
83views more  JAR 2002»
14 years 9 months ago
Mathematical Programming Embeddings of Logic
Abstract. Can theorem proving in mathematical logic be addressed by classical mathematical techniques like the calculus of variations? The answer is surprisingly in the affirmative...
Vivek S. Borkar, Vijay Chandru, Sanjoy K. Mitter
JUCS
2002
80views more  JUCS 2002»
14 years 9 months ago
On the Power of P Systems with Symport Rules
: A purely communicative variant of P systems was considered recently, based on the trans-membrane transport of couples of chemicals. When using both symport rules (the chemicals p...
Carlos Martín-Vide, Andrei Paun, Gheorghe P...
TMM
2002
91views more  TMM 2002»
14 years 9 months ago
Power-spectrum condition for energy-efficient watermarking
This paper presents a model for watermarking and some attacks on watermarks. Given the watermarked signal, the so-called Wiener attack performs minimum mean-squared error (MMSE) es...
Jonathan K. Su, Bernd Girod