Sciweavers

1123 search results - page 56 / 225
» GUI Testing Techniques Evaluation by Designed Experiments
Sort
View
SOUPS
2005
ACM
14 years 2 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
DAC
2002
ACM
14 years 9 months ago
Software synthesis from synchronous specifications using logic simulation techniques
This paper addresses the problem of automatic generation of implementation software from high-level functional specifications in the context of embedded system on chip designs. So...
Yunjian Jiang, Robert K. Brayton
TPCTC
2009
Springer
101views Hardware» more  TPCTC 2009»
14 years 3 months ago
Benchmarking ETL Workflows
Extraction–Transform–Load (ETL) processes comprise complex data workflows, which are responsible for the maintenance of a Data Warehouse. A plethora of ETL tools is currently a...
Alkis Simitsis, Panos Vassiliadis, Umeshwar Dayal,...
MOBISYS
2007
ACM
14 years 8 months ago
MobiUS: enable together-viewing video experience across two mobile devices
We envision a new better-together mobile application paradigm where multiple mobile devices are placed in a close proximity and study a specific together-viewing video application...
Guobin Shen, Yanlin Li, Yongguang Zhang
EIT
2008
IEEE
13 years 10 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno