Sciweavers

12084 search results - page 2305 / 2417
» Effect Systems with Subtyping
Sort
View
144
Voted
SENSYS
2006
ACM
15 years 9 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi
135
Voted
SIGCSE
2006
ACM
150views Education» more  SIGCSE 2006»
15 years 9 months ago
Pedagogical techniques supported by the use of student devices in teaching software engineering
This paper describes our experiences in promoting a learning environment where active student involvement and interaction, as well as openness to diversity of ideas are supported ...
Valentin Razmov, Richard J. Anderson
132
Voted
SMA
2006
ACM
101views Solid Modeling» more  SMA 2006»
15 years 9 months ago
A higher dimensional formulation for robust and interactive distance queries
We present an efficient and robust algorithm for computing the minimum distance between a point and freeform curve or surface by lifting the problem into a higher dimension. This...
Joon-Kyung Seong, David E. Johnson, Elaine Cohen
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 9 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
149
Voted
CVPR
2010
IEEE
15 years 9 months ago
ARISTA - Image Search to Annotation on Billions of Web Photos
Though it has cost great research efforts for decades, object recognition is still a challenging problem. Traditional methods based on machine learning or computer vision are stil...
Xin-Jing Wang, Ming Liu, Lei Zhang, Yi Li, Wei-Yin...
« Prev « First page 2305 / 2417 Last » Next »