Sciweavers

708 search results - page 22 / 142
» Computational Law
Sort
View
CONSTRAINTS
2010
75views more  CONSTRAINTS 2010»
15 years 1 months ago
Redundant modeling in permutation weighted constraint satisfaction problems
Yat Chiu Law, Jimmy Ho-Man Lee, May H. C. Woo
NSDI
2008
15 years 6 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
AUTOMATICA
2008
106views more  AUTOMATICA 2008»
15 years 4 months ago
Synchronizing linear systems via partial-state coupling
A basic result in synchronization of linear systems via output coupling is presented. For identical discrete-time linear systems that are detectable from their outputs and neutral...
S. Emre Tuna
CHI
2006
ACM
16 years 4 months ago
Targeted steering motions
In this paper we investigate targeted steering motions. Fitts' law is a very successful model to explain human targeting behavior, while the Steering law has been used to mod...
Sergey Kulikov, Wolfgang Stürzlinger
ENTCS
2008
94views more  ENTCS 2008»
15 years 4 months ago
From Reversible to Irreversible Computations
In this paper we study the relation between reversible and irreversible computation applicable to different models of computation -- here we are considering classical and quantum ...
Alexander S. Green, Thorsten Altenkirch