Sciweavers

548 search results - page 62 / 110
» Computation of Shape Through Controlled Active Exploration
Sort
View
DAC
2008
ACM
13 years 9 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
CHI
2001
ACM
14 years 8 months ago
Time Aura: interfaces for pacing
Historically one of the visions for human-computer symbiosis has been to augment human intelligence and extend people's cognitive abilities. In this paper, we present two vis...
Lena Mamykina, Elizabeth D. Mynatt, Michael A. Ter...
ACMDIS
2010
ACM
13 years 8 months ago
LumiBots: making emergence graspable in a swarm of robots
Emergence is a concept that is not easy to grasp, since it contradicts our idea of central control and planning. In this work, we use a swarm of robots as a tangible tool to visua...
Mey Lean Kronemann, Verena Vanessa Hafner
WILF
2009
Springer
196views Fuzzy Logic» more  WILF 2009»
14 years 8 days ago
Interactive Image Retrieval in a Fuzzy Framework
In this paper, an interactive image retrieval scheme using MPEG-7 visual descriptors is proposed. The performance of image retrieval systems is still limited due to semantic gap, w...
Malay Kumar Kundu, Minakshi Banerjee, Priyank Bagr...
IFIP13
2004
13 years 9 months ago
Analysing Dynamic Function Scheduling Decisions
: Function allocation, as a process used in the construction of dependable complex systems, is a significant aspect of the design and implementation of interactive systems. It invo...
Karsten Loer, Michael Hildebrandt, Michael D. Harr...