Sciweavers

687 search results - page 110 / 138
» On The Complexity of Manipulating Elections
Sort
View
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 6 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
GRAPHICSINTERFACE
2009
13 years 5 months ago
QuickSelect: history-based selection expansion
When editing a graphical document, it is common to apply a change to multiple items at once, and a variety of tools exist for selecting sets of items. However, directly selecting ...
Sara L. Su, Sylvain Paris, Frédo Durand
HCI
2009
13 years 5 months ago
Neurocognitive Workload Assessment Using the Virtual Reality Cognitive Performance Assessment Test
The traditional approach to assessing neurocognitive performance makes use of paper and pencil neuropsychological assessments. This received approach has been criticized as limited...
Thomas D. Parsons, Louise Cosand, Christopher G. C...
ICRA
2009
IEEE
196views Robotics» more  ICRA 2009»
13 years 5 months ago
CHOMP: Gradient optimization techniques for efficient motion planning
Abstract-- Existing high-dimensional motion planning algorithms are simultaneously overpowered and underpowered. In domains sparsely populated by obstacles, the heuristics used by ...
Nathan D. Ratliff, Matt Zucker, J. Andrew Bagnell,...
PVLDB
2010
252views more  PVLDB 2010»
13 years 2 months ago
Efficient and Effective Similarity Search over Probabilistic Data based on Earth Mover's Distance
Probabilistic data is coming as a new deluge along with the technical advances on geographical tracking, multimedia processing, sensor network and RFID. While similarity search is...
Jia Xu, Zhenjie Zhang, Anthony K. H. Tung, Ge Yu