Sciweavers

303 search results - page 30 / 61
» Challenging the Mathematics Curriculum
Sort
View
DSN
2004
IEEE
14 years 26 days ago
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
Ann T. Tai, Kam S. Tso, William H. Sanders
USS
2008
13 years 11 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
NCS
2008
96views more  NCS 2008»
13 years 10 months ago
Evolutionary Reproduction of Dutch Masters: The Mondriaan and Escher Evolvers
ct This chapter discusses two applications aiming at evolving images in the styles of two well-known Dutch painters: Mondriaan and Escher. For both cases we have an evaluation crit...
A. E. Eiben
ML
2008
ACM
13 years 9 months ago
Margin-based first-order rule learning
Abstract We present a new margin-based approach to first-order rule learning. The approach addresses many of the prominent challenges in first-order rule learning, such as the comp...
Ulrich Rückert, Stefan Kramer
CGF
2005
232views more  CGF 2005»
13 years 9 months ago
Algorithms for Interactive Editing of Level Set Models
Level set models combine a low-level volumetric representation, the mathematics of deformable implicit surfaces, and powerful, robust numerical techniques to produce a novel appro...
Ken Museth, David E. Breen, Ross T. Whitaker, Sean...