Sciweavers

408 search results - page 72 / 82
» Human-centered computing in international development
Sort
View
CHI
2007
ACM
14 years 10 months ago
A cognitive constraint model of dual-task trade-offs in a highly dynamic driving task
The paper describes an approach to modeling the strategic variations in performing secondary tasks while driving. In contrast to previous efforts that are based on simulation of a...
Duncan P. Brumby, Andrew Howes, Dario D. Salvucci
STACS
2010
Springer
14 years 4 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
COMPGEOM
1992
ACM
14 years 1 months ago
A Subexponential Bound for Linear Programming
We present a simple randomized algorithm which solves linear programs with n constraints and d variables in expected minfO(d 22dn); e 2 pdln(n= p d)+O( p d+lnn)g time in the unit ...
Jirí Matousek, Micha Sharir, Emo Welzl
BMCBI
2005
122views more  BMCBI 2005»
13 years 9 months ago
Bayesian coestimation of phylogeny and sequence alignment
Background: Two central problems in computational biology are the determination of the alignment and phylogeny of a set of biological sequences. The traditional approach to this p...
Gerton Lunter, István Miklós, Alexei...
IMC
2010
ACM
13 years 7 months ago
Primitives for active internet topology mapping: toward high-frequency characterization
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from ex...
Robert Beverly, Arthur Berger, Geoffrey G. Xie