Sumaya M Al-Bedaiwi, salbedaiwi@utexas.edu, Office hours: Mon 12:30 PM - 1:30 PM, Wed 3:30 PM - 4:30 PM in the GDC Basement.
Our students and faculty are changing the world through their contributions to computing education, research, and industry. These awards received by members of the UT Computer Science community make ...
where context-name is the name of the context (usually the name of the kind of object being identified or diagnosed, e.g., rock or patient), parameters is a list of parameter descriptions, ...
[ This section is a little out of place--need to introduce type and equality predicates first! Those have been presented in class, so this should be comprehensible anyway. Need to make this a separate ...
We can show you the Knuth-Pratt-Morris algorithm and we can show you the Boyer-Moore algorithm. Our algorithm has the peculiar property that, roughly speaking, the longer the pattern is, the faster ...
Scheme and Common Lisp use different names for some of the basic system functions. Many Lisp programs can be translated to the other dialect simply by changing these names (or by providing the ...
When emailing me, please put CS395 in the subject line. Topics: This is a graduate seminar course in computer vision. We will survey and discuss current vision papers relating to object recognition, ...
My main research interest is in computational theories of the brain with emphasis on human vision and motor control. In 1985 Chris Brown and I led a team that designed and built a high speed binocular ...
Computer ethics as a field of study was founded by MIT professor Norbert Wiener during World War Two (early 1940s) while helping to develop an antiaircraft cannon capable of shooting down fast ...
In his dissertation work, Tino developed the Enforced SubPopulations (ESP) neuroevolution method and applied it to robust nonlinear control, including that of a finless rocket RSX-2. He went on to ...