Sciweavers

ITICSE
2010
ACM
13 years 9 months ago
What did qubits ever do for me: an answer for CS2 students
We show how to teach and motivate small quantum computer programs as a supplemental topic in a CS2 data structures class. A traditional example such as Shor’s factorization [8] ...
Michael Main, Robert Frohardt, Yingdan Huang
BALT
2008
13 years 9 months ago
Flexible Database Platform for Biomedical Research with Multiple User Interfaces and a Universal Query Engine
Biomedical research on human subjects often requires a large amount of data to be collected by personal interviews, Internet based questionnaires, lab measurements or by extracting...
Margus Jäger, Liina Kamm, Darja Krushevskaja,...
ACSC
2008
IEEE
13 years 9 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such a...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank
ACSC
2008
IEEE
13 years 9 months ago
An investigation of the state formation and transition limitations for prediction problems in recurrent neural networks
Recurrent neural networks are able to store information about previous as well as current inputs. This "memory" allows them to solve temporal problems such as language r...
Angel Kennedy, Cara MacNish
ACMSE
2008
ACM
13 years 9 months ago
Parallel processing flow models on desktop hardware
Numerical solution of any large, three-dimensional fluid flow problem is a computationally intensive task that typically requires supercomputer solution to achieve reasonable exec...
Robert Geist, Zachary Jones, Jay E. Steele
ACMSE
2008
ACM
13 years 9 months ago
Optimization of the multiple retailer supply chain management problem
With stock surpluses and shortages representing one of the greatest elements of risk to wholesalers, a solution to the multiretailer supply chain management problem would result i...
Caio Soares, Gerry V. Dozier, Emmett Lodree, Jared...
ACMSE
2008
ACM
13 years 9 months ago
A study of the performance of steering tasks under spatial transformation of input
Indirection exists between the virtual objects that form the computer interface and the input devices through which the user interacts to manipulate these objects. This paper stud...
Mihail Eduard Tudoreanu, Eileen Kraemer
ACMSE
2008
ACM
13 years 9 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling