Sciweavers

105 search results - page 10 / 21
» Discouraging Software Piracy Using Software Aging
Sort
View
ASSETS
2006
ACM
14 years 1 months ago
Attention analysis in interactive software for children with autism
This work is a part of an ongoing project that focuses on potential applications of an interactive system that helps children with autism. Autism is classified as a neurodevelopm...
A. Ould Mohamed, Vincent Courboulay, Karim Sehaba,...
CHI
2009
ACM
14 years 8 months ago
Cell phone software aiding name recall
Senior citizens often find it difficult to remember names. This paper describes a novel cell phone application that uses information about one's social network and the places...
Kent Fenwick, Michael Massimi, Ronald Baecker, San...
ICCAD
1995
IEEE
97views Hardware» more  ICCAD 1995»
13 years 11 months ago
Interface co-synthesis techniques for embedded systems
A key aspect of the synthesis of embedded systems is the automatic integration of system components. This entails the derivation of both the hardware and software interfaces that ...
Pai H. Chou, Ross B. Ortega, Gaetano Borriello
IDT
2007
83views more  IDT 2007»
13 years 7 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 9 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...