Sciweavers

3154 search results - page 33 / 631
» Computing Closed Skycubes
Sort
View
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
14 years 3 months ago
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes ...
Wouter Kuijper, Jaco van de Pol
SIGCSE
1998
ACM
84views Education» more  SIGCSE 1998»
14 years 1 months ago
Integrating technology into computer science examinations
On-line programming tests and examinations were administered to approximately 120 first year computer science students in order to evaluate their practical skills. We describe ou...
David V. Mason, Denise M. Woit
LSSC
2005
Springer
14 years 2 months ago
On the Synthesis of a Stabilizing Feedback Control
Starting from states near to a closed set S we want to steer S and to stay always close to S. Unfortunately, open-loop controls are very sensitive to disturbances and can lead to v...
Mikhail Krastanov
HCI
2009
13 years 6 months ago
Evaluating a Personal Communication Tool: Sidebar
:
Malena R. Mesarina, Jhilmil Jain, Craig Sayers, Ty...
HINC
2003
Springer
14 years 2 months ago
Early Curricula in Computer Science at the University of Iceland
With the acquisition of the first computer in 1964 programming was introduced into the engineering curriculum at the University of Iceland. Subsequently applied mathematics curricu...
Oddur Benediktsson