Sciweavers

9105 search results - page 15 / 1821
» Design of the MUC-6 evaluation
Sort
View
ISCA
2005
IEEE
79views Hardware» more  ISCA 2005»
14 years 1 months ago
Design and Evaluation of Hybrid Fault-Detection Systems
As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Up to now, system designers have prim...
George A. Reis, Jonathan Chang, Neil Vachharajani,...
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
HICSS
2002
IEEE
82views Biometrics» more  HICSS 2002»
14 years 22 days ago
The IT Support for Acquired Brain Injury Patients - the Design and Evaluation of a New Software Package
The problems of producing a software system to assist in the rehabilitation of people who have suffered serious traumatic brain injuries are described. In addition to this primary...
Micaela Serra, Jon C. Muzio
CSL
2011
Springer
13 years 2 months ago
Designing and evaluating a wizarded uncertainty-adaptive spoken dialogue tutoring system
We describe the design and evaluation of two different dynamic student uncertainty adaptations in wizarded versions of a spoken dialogue tutoring system. The two adaptive systems...
Katherine Forbes-Riley, Diane J. Litman
CCECE
2006
IEEE
14 years 1 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...