Sciweavers

1216 search results - page 193 / 244
» Hybrid type checking
Sort
View
CHI
2008
ACM
14 years 9 months ago
Evaluating visual cues for window switching on large screens
An increasing number of users are adopting large, multimonitor displays. The resulting setups cover such a broad viewing angle that users can no longer simultaneously perceive all...
Raphael Hoffmann, Patrick Baudisch, Daniel S. Weld
DCC
2004
IEEE
14 years 8 months ago
Length-Limited Variable-to-Variable Length Codes For High-Performance Entropy Coding
Arithmetic coding achieves a superior coding rate when encoding a binary source, but its lack of speed makes it an inferior choice when true high? performance encoding is needed. ...
Joshua G. Senecal, Mark A. Duchaineau, Kenneth I. ...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 3 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
GLOBECOM
2009
IEEE
14 years 3 months ago
Design of Signal Constellation Rearrangement (CoRe) for Multiple Relay Links
Abstract – This paper considers a design of signal constellations for trans-modulation (constellation rearrangement: CoRe) in a relay system with the multiple links in which the ...
Jin Woo Kim, Hee S. Lee, Jae Yung Ahn, Chung Gu Ka...
ICSM
2009
IEEE
14 years 3 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy