Sciweavers

16513 search results - page 3205 / 3303
» Numerical Analysis Methods
Sort
View
97
Voted
NORDICHI
2006
ACM
15 years 8 months ago
The FaceReader: measuring instant fun of use
Recently, more and more attention has been paid to emotions in the domain of Human-Computer Interaction. When evaluating a product, one can no longer ignore the emotions a product...
Bieke Zaman, Tara Shrimpton-Smith
138
Voted
PLDI
2006
ACM
15 years 8 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
174
Voted
SASN
2006
ACM
15 years 8 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
149
Voted
SIGECOM
2006
ACM
143views ECommerce» more  SIGECOM 2006»
15 years 8 months ago
The computational complexity of nash equilibria in concisely represented games
Games may be represented in many different ways, and different representations of games affect the complexity of problems associated with games, such as finding a Nash equilib...
Grant Schoenebeck, Salil P. Vadhan
119
Voted
CODES
2005
IEEE
15 years 8 months ago
Future wireless convergence platforms
As wireless platforms converge to multimedia systems, architectures must converge to support voice, data, and video applications. From a processor architecture perspective, suppor...
C. John Glossner, Mayan Moudgill, Daniel Iancu, Ga...
« Prev « First page 3205 / 3303 Last » Next »