Sciweavers

1421 search results - page 276 / 285
» Designing system on a chip products using systems engineerin...
Sort
View
FSTTCS
2003
Springer
14 years 20 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
UIST
2006
ACM
14 years 1 months ago
Projector-guided painting
This paper presents a novel interactive system for guiding artists to paint using traditional media and tools. The enabling technology is a multi-projector display capable of cont...
Matthew Flagg, James M. Rehg
CODES
2007
IEEE
14 years 1 months ago
HW/SW co-design for Esterel processing
We present a co-synthesis approach that accelerates reactive software processing by moving the calculation of complex expressions into external combinational hardware. The startin...
Sascha Gädtke, Claus Traulsen, Reinhard von H...
SIGCOMM
2009
ACM
14 years 2 months ago
GrassRoots: socially-driven web sites for the masses
Large, socially-driven Web 2.0 sites such as Facebook and Youtube have seen significant growth in popularity [5, 10]. However, strong demand also exists for socially-driven web s...
Frank Uyeda, Diwaker Gupta, Amin Vahdat, George Va...
VIP
2001
13 years 8 months ago
Avatars: A Shifting Interaction
The intersection of theatre-performance, design, and informatics is a fertile area for a broader understanding of the possible design and interaction between people and avatars in...
Kristine Deray