Sciweavers

2703 search results - page 152 / 541
» Working Class Hero
Sort
View
ETS
2000
IEEE
113views Hardware» more  ETS 2000»
13 years 10 months ago
NetChat: Communication and Collaboration via WWW
Practice has shown that providing content to students alone is not sufficient for good learning results. In computer based training (CBT) and especially webbased training (WBT) en...
Reinhard Kreutz, Sven Kiesow, Klaus Spitzer
JOT
2002
105views more  JOT 2002»
13 years 10 months ago
Java Distributed Separate Objects
Java supports distributed programming using threads and Remote Method Invocation (JRMI). However, a Java thread does not match well with the object concept, and JRMI cannot easily...
Miguel Katrib, Iskander Sierra, Mario del Valle, T...
NN
1998
Springer
108views Neural Networks» more  NN 1998»
13 years 10 months ago
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
Learning long-term temporal dependencies with recurrent neural networks can be a difficult problem. It has recently been shown that a class of recurrent neural networks called NA...
Tsungnan Lin, Bill G. Horne, C. Lee Giles
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
13 years 10 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 10 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...