Sciweavers

5675 search results - page 156 / 1135
» Exploiting Chaos for Computation
Sort
View
148
Voted
UAIS
2002
100views more  UAIS 2002»
15 years 4 months ago
Toward overcoming culture, skill and situation hurdles in Human-Computer Interaction
Abstract. This paper proposes a new effective strategy for designing and implementing interactive systems overcoming culture, skill and situation hurdles in HumanComputer Interacti...
Paola Carrara, Daniela Fogli, Giuseppe Fresta, Pie...
HYBRID
2007
Springer
15 years 10 months ago
Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems
This work investigates some of the computational issues involved in the solution of probabilistic reachability problems for discretetime, controlled stochastic hybrid systems. It i...
Alessandro Abate, Saurabh Amin, Maria Prandini, Jo...
APLAS
2006
ACM
15 years 10 months ago
Computational Secrecy by Typing for the Pi Calculus
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal ...
Martín Abadi, Ricardo Corin, Cédric ...
DATE
2005
IEEE
140views Hardware» more  DATE 2005»
15 years 10 months ago
Quality-Driven Proactive Computation Elimination for Power-Aware Multimedia Processing
We present a novel, quality-driven, architectural-level approach that trades-off the output quality to enable power-aware processing of multimedia streams. The error tolerance of ...
Shrirang M. Yardi, Michael S. Hsiao, Thomas L. Mar...
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 10 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner