Sciweavers

15644 search results - page 2954 / 3129
» Brittle System Analysis
Sort
View
ACMDIS
2010
ACM
15 years 4 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
15 years 4 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
ATAL
2010
Springer
15 years 4 months ago
Avoiding the prisoner's dilemma in auction-based negotiations for highly rugged utility spaces
There is a number of recent research lines addressing complex negotiations in highly rugged utility spaces. However, most of them focus on overcoming the problems imposed by the c...
Ivan Marsá-Maestre, Miguel A. López-...
MM
2010
ACM
251views Multimedia» more  MM 2010»
15 years 4 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno
RECSYS
2010
ACM
15 years 4 months ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
« Prev « First page 2954 / 3129 Last » Next »