Sciweavers

1818 search results - page 104 / 364
» Operant conditioning
Sort
View
PLDI
2000
ACM
15 years 6 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
ACSC
2004
IEEE
15 years 6 months ago
Lossless Image Compression Using Pixel Reordering
Lossless image compression techniques typically consider images to be a sequence of pixels in row major order. The processing of each pixel consists of two separate operations. Th...
Michael Ciavarella, Alistair Moffat
WICON
2008
15 years 3 months ago
HxH: a hop-by-hop transport protocol for multi-hop wireless networks
TCP can perform poorly in multi-hop wireless networks due to problems that arise with contention and mobility. Endto-end protocols are at an inherent disadvantage in trying to sol...
Daniel Scofield, Lei Wang, Daniel Zappala
CGVR
2006
15 years 3 months ago
A Comparison of Real and Virtual 3D Construction Tools with Novice Users
In this paper, we present the results of a comparative evaluation of a "virtual Lego" system against real Lego bricks with novice users. The virtual Lego system was desi...
Hooman Baradaran, Wolfgang Stürzlinger
101
Voted
GRAPHICSINTERFACE
2001
15 years 3 months ago
An Isometric Joystick as a Pointing Device for Handheld Information Terminals
Meeting the increasing demand for desktop-like applications on mobile products requires powerful interaction techniques. One candidate is GUI-style point-andclick interaction usin...
Miika Silfverberg, I. Scott MacKenzie, Tatu Kauppi...