Sciweavers

992 search results - page 152 / 199
» Evaluating and Comparing Interaction Styles
Sort
View
VLSID
2005
IEEE
224views VLSI» more  VLSID 2005»
14 years 8 months ago
Accurate Stacking Effect Macro-Modeling of Leakage Power in Sub-100nm Circuits
An accurate and efficient stacking effect macro-model for leakage power in sub-100nm circuits is presented in this paper. Leakage power, including subthreshold leakage power and ga...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
CCECE
2006
IEEE
14 years 2 months ago
Software Defect Content Estimation: A Bayesian Approach
Software inspection is a method to detect errors in software artefacts early in the development cycle. At the end of the inspection process the inspectors need to make a decision ...
Achin Jain, Alok R. Patnaik, Pulak Dhar, Vineet Sr...
INFOCOM
2006
IEEE
14 years 2 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
DSN
2005
IEEE
14 years 1 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
ITS
2004
Springer
129views Multimedia» more  ITS 2004»
14 years 1 months ago
Spoken Versus Typed Human and Computer Dialogue Tutoring
While human tutors typically interact with students using spoken dialogue, most computer dialogue tutors are text-based. We have conducted two experiments comparing typed and spoke...
Diane J. Litman, Carolyn Penstein Rosé, Kat...