Sciweavers

246 search results - page 29 / 50
» Acquisition of expanding targets
Sort
View
CCS
2011
ACM
12 years 7 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
WSC
2007
13 years 10 months ago
Using ontologies for simulation integration
This paper describes the motivations, methods, and solution concepts for the use of ontologies for simulation model integration. Ontological analysis has been shown to be an effec...
Perakath C. Benjamin, Kumar V. Akella, Ajay Verma
PRESENCE
2000
145views more  PRESENCE 2000»
13 years 7 months ago
Control Design and Task Performance in Endoscopic Tele-Operation
Endoscopic surgery, while offering considerable gains for the patient, has created new difficulties for the surgeon. One problem is the fulcrum effect, which causes the movement o...
Ori Ben-Porat, Moshe Shoham, Joachim Meyer
IMCSIT
2010
13 years 5 months ago
German subordinate clause word order in dialogue-based CALL.
We present a dialogue system for exercising the German subordinate clause word order. The pedagogical methodology we adopt is based on focused tasks: the targeted linguistic struct...
Magdalena Wolska, Sabrina Wilske
CHI
2006
ACM
14 years 8 months ago
Precise selection techniques for multi-touch screens
The size of human fingers and the lack of sensing precision can make precise touch screen interactions difficult. We present a set of five techniques, called Dual Finger Selection...
Hrvoje Benko, Andrew D. Wilson, Patrick Baudisch