Sciweavers

950 search results - page 129 / 190
» presence 2008
Sort
View
CHI
2008
ACM
15 years 10 months ago
Human-aided computing: utilizing implicit human processing to classify images
In this paper, we present Human-Aided Computing, an approach that uses an electroencephalograph (EEG) device to measure the presence and outcomes of implicit cognitive processing,...
Pradeep Shenoy, Desney S. Tan
POPL
2008
ACM
15 years 10 months ago
Lightweight semiformal time complexity analysis for purely functional data structures
Okasaki and others have demonstrated how purely functional data structures that are efficient even in the presence of persistence can be constructed. To achieve good time bounds e...
Nils Anders Danielsson
RECOMB
2008
Springer
15 years 10 months ago
Limitations of Pseudogenes in Identifying Gene Losses
The loss of previously established genes has been proposed as a major force in evolutionary change. While the sequencing of many new species offers the opportunity to identify case...
James C. Costello, Mira V. Han, Matthew W. Hahn
CADE
2008
Springer
15 years 10 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
PODS
2008
ACM
129views Database» more  PODS 2008»
15 years 9 months ago
Tree-width and functional dependencies in databases
Conjunctive query (CQ) evaluation on relational databases is NP-complete in general. Several restrictions, like bounded tree-width and bounded hypertree-width, allow polynomial ti...
Isolde Adler