Sciweavers

372 search results - page 71 / 75
» The box mover problem
Sort
View
ECAI
2004
Springer
14 years 23 days ago
A Context-Based Model of Attention
d abstract)1 Niek Bergboer Eric Postma Jaap van den Herik Institute for Knowledge and Agent Technology, Universiteit Maastricht, P.O. Box 616, 6200 MD Maastricht It is well known t...
Niek Bergboer, Eric O. Postma, H. Jaap van den Her...
DAC
2003
ACM
14 years 18 days ago
Crosstalk noise in FPGAs
In recent years, due to rapid advances in VLSI manufacturing technology capable of packing more and more devices and wires on a chip, crosstalk has emerged as a serious problem af...
Yajun Ran, Malgorzata Marek-Sadowska
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 6 days ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
GI
2009
Springer
13 years 12 months ago
The Human Being as a Servo. Von Feedback Control zur Kybernetik
Abstract: Am Anfang der Kybernetik steht die Erkenntnis Norbert Wieners, dass Lebewesen und Maschinen etwas gemeinsam haben: Ihr Verhalten l¨asst sich als Feedbackprozess beschrei...
Lasse Scherffig
IWANN
2009
Springer
13 years 12 months ago
Easing the Smart Home: Translating Human Hierarchies to Intelligent Environments
Abstract. Ubiquitous computing research have extended traditional environments in the so–called Intelligent Environments. All of them use their capabilities for pursuing their in...
Manuel García-Herranz, Pablo A. Haya, Xavie...