Sciweavers

17082 search results - page 3278 / 3417
» Abstractions for Mobile Computation
Sort
View
JMLR
2008
127views more  JMLR 2008»
15 years 4 months ago
Incremental Identification of Qualitative Models of Biological Systems using Inductive Logic Programming
The use of computational models is increasingly expected to play an important role in predicting the behaviour of biological systems. Models are being sought at different scales o...
Ashwin Srinivasan, Ross D. King
JUCS
2008
156views more  JUCS 2008»
15 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JUCS
2008
166views more  JUCS 2008»
15 years 4 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
JMM2
2006
138views more  JMM2 2006»
15 years 4 months ago
A Framework for Constructing Real-time Immersive Environments for Training Physical Activities
Abstract-- This paper describes a framework for constructing a three-dimensional immersive environment that can be used for training physical activities. The system is designed to ...
Sang-Hack Jung, Ruzena Bajcsy
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
15 years 4 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
« Prev « First page 3278 / 3417 Last » Next »