Sciweavers

12183 search results - page 55 / 2437
» Computers under Attacks!
Sort
View
AUIC
2000
IEEE
14 years 2 months ago
Programming without a Computer: A New Interface for Children under Eight
Electronic Blocks are a new programming interface, designed for children aged between three and eight years. The Electronic Blocks programming environment includes sensor blocks, ...
Peta Wyeth, Helen C. Purchase
ISIPTA
2005
IEEE
130views Mathematics» more  ISIPTA 2005»
14 years 3 months ago
Computing Lower and Upper Expectations under Epistemic Independence
This papers investigates the computation of lower/upper expectations that must cohere with a collection of probabilistic assessments and a collection of judgements of epistemic in...
Cassio Polpo de Campos, Fabio Gagliardi Cozman
ECAI
2010
Springer
13 years 11 months ago
Fair Division under Ordinal Preferences: Computing Envy-Free Allocations of Indivisible Goods
We study the problem of fairly dividing a set of goods amongst a group of agents, when those agents have preferences that are ordinal relations over alternative bundles of goods (r...
Sylvain Bouveret, Ulle Endriss, Jérôm...
CCS
2007
ACM
14 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
IJCAI
1993
13 years 11 months ago
Action Representation and Purpose: Re-evaluating the Foundations of Computational Vision
The traditional goal of computer vision, to reconstruct, or recover properties of, the scene has recently been challenged by advocates of a new purposive approach in which the vis...
Michael J. Black, Yiannis Aloimonos, Christopher M...