We present a qualitative study of mobile phone ownership, replacement and disposal practices geared towards identifying design opportunities towards sustainable mobile phone inter...
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Multi-class classification schemes typically require human input in the form of precise category names or numbers for each example to be annotated – providing this can be impra...
Ajay Joshi, Fatih Porikli, Nikolaos Papanikolopoul...
Value prediction breaks data dependencies in a program thereby creating instruction level parallelism that can increase program performance. Hardware based value prediction techni...
Abstract—Polarized logic is the logic of values and continuations, and their interaction through continuation-passing style. The main limitations of this logic are the limitation...