Sciweavers

14518 search results - page 2661 / 2904
» Two Problems for Sophistication
Sort
View
STOC
2009
ACM
171views Algorithms» more  STOC 2009»
16 years 5 months ago
On the geometry of graphs with a forbidden minor
We study the topological simplification of graphs via random embeddings, leading ultimately to a reduction of the Gupta-Newman-Rabinovich-Sinclair (GNRS) L1 embedding conjecture t...
James R. Lee, Anastasios Sidiropoulos
VLSID
2009
IEEE
108views VLSI» more  VLSID 2009»
16 years 5 months ago
Metric Based Multi-Timescale Control for Reducing Power in Embedded Systems
Abstract--Digital control for embedded systems often requires low-power, hard real-time computation to satisfy high control-loop bandwidth, low latency, and low-power requirements....
Forrest Brewer, João Pedro Hespanha, Nitin ...
184
Voted
CCS
2009
ACM
16 years 5 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CHI
2009
ACM
16 years 5 months ago
The accidental tutor: overlaying an intelligent tutor on an existing user interface
Intelligent Tutoring Systems (ITSs) have been shown to have dramatic impact on student learning [9]. However, these gains have been mostly in topics in which the interface has bee...
Liz Blankenship, Stephen B. Gilbert, Stephen Bless...
CHI
2009
ACM
16 years 5 months ago
A comparative study of interaction metaphors for large-scale displays
Large screen displays require new interaction techniques because of their physical size. Even though there are technologies that tackle the problem of interaction with such device...
Ricardo Jota, João Madeiras Pereira, Joaqui...
« Prev « First page 2661 / 2904 Last » Next »