Sciweavers

1850 search results - page 304 / 370
» Design-for-debugging of application specific designs
Sort
View
107
Voted
CSCW
2008
ACM
15 years 4 months ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
127
Voted
COMMA
2008
15 years 4 months ago
Political Engagement Through Tools for Argumentation
In this paper we discuss the development of tools to support a system for edemocracy that is based upon and makes use of existing theories of argument representation and evaluatio...
Dan Cartwright, Katie Atkinson
102
Voted
LREC
2010
156views Education» more  LREC 2010»
15 years 4 months ago
Heterogeneous Sensor Database in Support of Human Behaviour Analysis in Unrestricted Environments: The Audio Part
In the present paper we report on a recent effort that resulted in the establishment of a unique multimodal database, referred to as the PROMETHEUS database. This database was cre...
Stavros Ntalampiras, Todor Ganchev, Ilyas Potamiti...
88
Voted
HCI
2007
15 years 4 months ago
A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships
This paper describes a hybrid methodology to study users in ongoing relationships based on three levels of user data analysis. Most user-centered design methods are ideal for the a...
Enric Mor, Muriel Garreta Domingo, Julià Mi...
144
Voted
ICISC
2008
129views Cryptology» more  ICISC 2008»
15 years 4 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar