Sciweavers

548 search results - page 53 / 110
» Liberate Computer User from Programming
Sort
View
CHI
2003
ACM
14 years 8 months ago
The digital set-top box as a virtual channel provider
This research is based on the realization that the desktop computing paradigm is not appropriate for television, because it is adapted to fundamentally different user aspirations ...
Konstantinos Chorianopoulos
CVPR
2011
IEEE
13 years 4 months ago
Auto Directed Video Stabilization with Robust L1 Optimal Camera Paths
We present a novel algorithm for automatically applying constrainable, L1-optimal camera paths to generate stabilized videos by removing undesired motions. Our goal is to compute ...
Matthias Grundmann, Vivek Kwatra, Irfan Essa
MP
2006
119views more  MP 2006»
13 years 7 months ago
Approximate extended formulations
Mixed integer programming (MIP) formulations are typically tightened through the use of a separation algorithm and the addition of violated cuts. Using extended formulations involv...
Mathieu Van Vyve, Laurence A. Wolsey
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 1 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
UM
2009
Springer
14 years 2 months ago
Evaluating Web Based Instructional Models Using Association Rule Mining
Abstract. In this paper we describe an Integrated Development System for Instructional Model for E-learning (INDESIME) to create and to maintain instructional models using adaptive...
Enrique García, Cristóbal Romero, Se...