Sciweavers

1635 search results - page 214 / 327
» Reasoning from Data Rather than Theory
Sort
View
NCA
2007
IEEE
14 years 3 months ago
A Topological Analysis of Monitor Placement
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 2 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
PEPM
2004
ACM
14 years 2 months ago
Dynamic slicing based on redex trails
Tracing computations is a widely used methodology for program debugging. Lazy languages, in particular, pose new demands on tracing techniques since following the actual trace of ...
Claudio Ochoa, Josep Silva, Germán Vidal
UM
2010
Springer
14 years 2 months ago
Detecting Gaming the System in Constraint-Based Tutors
Recently, detectors of gaming the system have been developed for several intelligent tutoring systems where the problem-solving process is reified, and gaming consists of systemati...
Ryan S. J. d. Baker, Antonija Mitrovic, Moffat Mat...
VISUALIZATION
2002
IEEE
14 years 2 months ago
Geometric Surface Smoothing via Anisotropic Diffusion of Normals
This paper introduces a method for smoothing complex, noisy surfaces, while preserving (and enhancing) sharp, geometric features. It has two main advantages over previous approach...
Tolga Tasdizen, Ross T. Whitaker, Paul Burchard, S...