This paper is concerned with the problem of computing a discretecoefficient approximation to a digital filter. In contrast to earlier works that have approached this problem usi...
Subramanian Ramamoorthy, Lothar Wenzel, James Nagl...
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
This two-day workshop brings together the interdisciplinary community of scholars and practitioners involved in the design of interactive systems and sharing a common interest in ...
Abstract We introduce our human-centered approach for designing a ubiquitous computing system which aims at providing a better experience for shoppers at a supermarket. We investig...