Sciweavers

117 search results - page 22 / 24
» A Comparison of Cryptography Courses
Sort
View
CIARP
2009
Springer
14 years 2 months ago
3D and Appearance Modeling from Images
This paper gives an overview of works done in our group on 3D and appearance modeling of objects, from images. The backbone of our approach is to use what we consider as the princi...
Peter F. Sturm, Amaël Delaunoy, Pau Gargallo,...
ICSEA
2007
IEEE
14 years 1 months ago
A Model for the Effect of Caching on Algorithmic Efficiency in Radix based Sorting
— This paper demonstrates that the algorithmic performance of end user programs may be greatly affected by the two or three level caching scheme of the processor, and we introduc...
Arne Maus, Stein Gjessing
HRI
2006
ACM
14 years 1 months ago
Empirical results from using a comfort level device in human-robot interaction studies
This paper describes an extensive analysis of the comfort level data of 7 subjects with respect to 12 robot behaviours as part of a human-robot interaction trial. This includes ro...
Kheng Lee Koay, Kerstin Dautenhahn, Sarah Woods, M...
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 21 days ago
Digital Documents and Media
People need to find, work with, and put together information. Diverse activities, such as scholarly research, comparison shopping, and entertainment involve collecting and connect...
Michael A. Shepherd
ICCAD
2003
IEEE
99views Hardware» more  ICCAD 2003»
14 years 21 days ago
A Probabilistic Approach to Buffer Insertion
This work presents a formal probabilistic approach for solving optimization problems in design automation. Prediction accuracy is very low especially at high levels of design flo...
Vishal Khandelwal, Azadeh Davoodi, Akash Nanavati,...