Sciweavers

11428 search results - page 2154 / 2286
» Learning From Crowds
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 4 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
HASKELL
2006
ACM
14 years 4 months ago
Statically typed linear algebra in Haskell
Many numerical algorithms are specified in terms of operations on vectors and matrices. Matrix operations can be executed extremely efficiently using specialized linear algebra k...
Frederik Eaton
ITICSE
2006
ACM
14 years 4 months ago
Approaches to teaching the programming languages course: a potpourri
The release of Curriculum 2001 coupled with the increasing importance of the World Wide Web and the changes in pedagogy enabled by new technologies has made the choices about what...
Elizabeth S. Adams, Doug Baldwin, Judith Bishop, J...
MM
2006
ACM
189views Multimedia» more  MM 2006»
14 years 4 months ago
Real-time computerized annotation of pictures
Automated annotation of digital pictures has been a highly challenging problem for computer scientists since the invention of computers. The capability of annotating pictures by c...
Jia Li, James Ze Wang
MM
2006
ACM
178views Multimedia» more  MM 2006»
14 years 4 months ago
Multimedia signal processing for behavioral quantification in neuroscience
While there have been great advances in quantification of the genotype of organisms, including full genomes for many species, the quantification of phenotype is at a comparatively...
Peter Andrews, Haibin Wang, Dan Valente, Jih&egrav...
« Prev « First page 2154 / 2286 Last » Next »