Sciweavers

203 search results - page 27 / 41
» Reflections on reflections in explicit mathematics
Sort
View
SPW
2000
Springer
13 years 11 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
ASPDAC
2008
ACM
104views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Low power clock buffer planning methodology in F-D placement for large scale circuit design
Traditionally, clock network layout is performed after cell placement. Such methodology is facing a serious problem in nanometer IC designs where people tend to use huge clock buff...
Yanfeng Wang, Qiang Zhou, Yici Cai, Jiang Hu, Xian...
ASSETS
2008
ACM
13 years 9 months ago
Hover or tap?: supporting pen-based menu navigation for older adults
Tablet PCs are gaining popularity, but many users, particularly older ones, still struggle with pen-based interaction. One type of error, drifting, occurs when users accidentally ...
Karyn Moffatt, Sandra Yuen, Joanna McGrenere
CBSE
2008
Springer
13 years 9 months ago
Life-Cycle Aware Modelling of Software Components
Current software component models insufficiently reflect the different stages of component life-cycle, which involves design, implementation, deployment, and runtime. Therefore, re...
Heiko Koziolek, Steffen Becker, Jens Happe, Ralf R...
NIPS
2008
13 years 9 months ago
Implicit Mixtures of Restricted Boltzmann Machines
We present a mixture model whose components are Restricted Boltzmann Machines (RBMs). This possibility has not been considered before because computing the partition function of a...
Vinod Nair, Geoffrey E. Hinton