Sciweavers

215 search results - page 39 / 43
» Computing Branches Out: On Revitalizing Computing Education
Sort
View
DAGSTUHL
2001
13 years 11 months ago
A Language and System for Constructing and Presenting Low Fidelity Algorithm Visualizations
Computer science educators have traditionally used algorithm visualization (AV) software to create graphical representations of algorithms that are later used as visual aids in lec...
Christopher D. Hundhausen, Sarah A. Douglas
ICDAR
2003
IEEE
14 years 3 months ago
On-line Overlaid-Handwriting Recognition Based on Substroke HMMs
This paper proposes a novel handwriting recognition interface for wearable computing where users write characters continuously without pauses on a small single writing box. Since ...
Hiroshi Shimodaira, Takashi Sudo, Mitsuru Nakai, S...
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 10 months ago
On CSP and the Algebraic Theory of Effects
We consider CSP from the point of view of the algebraic theory of effects, which classifies operations as effect constructors and effect deconstructors; it also provides a link wit...
Rob J. van Glabbeek, Gordon D. Plotkin
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 10 months ago
Temporal Support of Regular Expressions in Sequential Pattern Mining
Classic algorithms for sequential pattern discovery, return all frequent sequences present in a database. Since, in general, only a few ones are interesting from a user's poin...
Leticia I. Gómez, Bart Kuijpers, Alejandro ...
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 10 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata