Sciweavers

2842 search results - page 488 / 569
» The Learn@WU Learning Environment
Sort
View
151
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
151
Voted
FECS
2010
236views Education» more  FECS 2010»
15 years 1 months ago
Development of a system for teaching CS1 in C/C++ with Lego NXT robots
This paper describes the development of a system for teaching C/C++ using a LegoTM NXT in a CSI college course on introductory programming. The programming of the NXT robot has be...
Amy Delman, Adiba Ishak, Lawrence Goetz, Mikhail K...
143
Voted
SECON
2010
IEEE
15 years 1 months ago
Tones for Real: Managing Multipath in Underwater Acoustic Wakeup
The principles of sensor networks--low-power, wireless, in-situ sensing with many inexpensive sensors--are only recently penetrating into underwater research. Acoustic communicati...
Affan A. Syed, John S. Heidemann, Wei Ye
171
Voted
AAAI
2010
15 years 5 months ago
A Layered Approach to People Detection in 3D Range Data
People tracking is a key technology for autonomous systems, intelligent cars and social robots operating in populated environments. What makes the task difficult is that the appea...
Luciano Spinello, Kai Oliver Arras, Rudolph Triebe...
100
Voted
AAAI
1996
15 years 5 months ago
Scaling up Logic-Based Truth Maintenance Systems via Fact Garbage Collection
Truth maintenance systems provide caches of beliefs and inferences that support explanations and search. Traditionally, the cost of using a TMS is monotonic growth in the size of ...
John O. Everett, Kenneth D. Forbus