Sciweavers

993 search results - page 113 / 199
» Set Constraints on Regular Terms
Sort
View
DRM
2006
Springer
14 years 1 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
AAAI
2008
14 years 17 days ago
Feature Selection for Activity Recognition in Multi-Robot Domains
In multi-robot settings, activity recognition allows a robot to respond intelligently to the other robots in its environment. Conditional random fields are temporal models that ar...
Douglas L. Vail, Manuela M. Veloso
IADIS
2003
13 years 11 months ago
Learning with Educational Hypermedia Software: The Impact of Signals in Animations
The present study investigated the instructional value of signals for learning while comparing two animations that differed solely in the presence / absence of visual signals. Sig...
Thomas Huk, Mattias Steinke, Christian Floto
WICSA
2004
13 years 11 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
ISLPED
2010
ACM
193views Hardware» more  ISLPED 2010»
13 years 10 months ago
PASAP: power aware structured ASIC placement
Structured ASICs provide an exciting middle ground between FPGA and ASIC design methodologies. Compared to ASIC, structured ASIC based designs require lower non recurring engineer...
Ashutosh Chakraborty, David Z. Pan