Sciweavers

1818 search results - page 104 / 364
» Operant conditioning
Sort
View
PLDI
2000
ACM
14 years 1 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
ACSC
2004
IEEE
14 years 18 days ago
Lossless Image Compression Using Pixel Reordering
Lossless image compression techniques typically consider images to be a sequence of pixels in row major order. The processing of each pixel consists of two separate operations. Th...
Michael Ciavarella, Alistair Moffat
WICON
2008
13 years 10 months ago
HxH: a hop-by-hop transport protocol for multi-hop wireless networks
TCP can perform poorly in multi-hop wireless networks due to problems that arise with contention and mobility. Endto-end protocols are at an inherent disadvantage in trying to sol...
Daniel Scofield, Lei Wang, Daniel Zappala
CGVR
2006
13 years 10 months ago
A Comparison of Real and Virtual 3D Construction Tools with Novice Users
In this paper, we present the results of a comparative evaluation of a "virtual Lego" system against real Lego bricks with novice users. The virtual Lego system was desi...
Hooman Baradaran, Wolfgang Stürzlinger
GRAPHICSINTERFACE
2001
13 years 10 months ago
An Isometric Joystick as a Pointing Device for Handheld Information Terminals
Meeting the increasing demand for desktop-like applications on mobile products requires powerful interaction techniques. One candidate is GUI-style point-andclick interaction usin...
Miika Silfverberg, I. Scott MacKenzie, Tatu Kauppi...