Sciweavers

1298 search results - page 112 / 260
» Exploring second life
Sort
View
CHI
2007
ACM
14 years 9 months ago
Localized iterative design for language learning in underdeveloped regions: the PACE framework
Poor literacy remains a decisive barrier to the economic empowerment of many people in the developing world. Of particular importance is literacy in a widely spoken "world la...
Matthew Kam, Divya Ramachandran, Varun Devanathan,...
RECONFIG
2009
IEEE
182views VLSI» more  RECONFIG 2009»
14 years 4 months ago
Scalability Studies of the BLASTn Scan and Ungapped Extension Functions
BLASTn is a ubiquitous tool used for large scale DNA analysis. Detailed profiling tests reveal that the most computationally intensive sections of the BLASTn algorithm are the sc...
Siddhartha Datta, Ron Sass
ICRA
2007
IEEE
122views Robotics» more  ICRA 2007»
14 years 3 months ago
Exploiting the Information at the Loop Closure in SLAM
— This paper presents two methods able to exploit the information at the loop closure in the SLAM problem. Both methods have three fundamental advantages. The first one is that ...
Agostino Martinelli, Roland Siegwart
ACSAC
2006
IEEE
14 years 3 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
ISLPED
2005
ACM
150views Hardware» more  ISLPED 2005»
14 years 2 months ago
Fast configurable-cache tuning with a unified second-level cache
Tuning a configurable cache subsystem to an application can greatly reduce memory hierarchy energy consumption. Previous tuning methods use a level one configurable cache only, or...
Ann Gordon-Ross, Frank Vahid, Nikil D. Dutt