Sciweavers

105 search results - page 7 / 21
» Secure-system design methods: evolution and future direction...
Sort
View
CEC
2005
IEEE
14 years 1 months ago
Crossing the fabrication gap: evolving assembly plans to build 3-D objects
Evolutionary Computation has demonstrated the ability to design novel and interesting objects. Such objects are increasingly being assembled in the physical world, albeit with some...
John Rieffel, Jordan B. Pollack
CHI
2004
ACM
14 years 7 months ago
A cognitive meta-analysis of design approaches to interruptions in intelligent environments
Minimizing interruptions to users is a crucial and acknowledged precondition for the adoption of new intelligent technologies such as ubiquitous and proactive computing. This pape...
Antti Oulasvirta, Antti Salovaara
SIGDOC
1998
ACM
13 years 11 months ago
Managing the Software Design Documents with XML
It is hard to manage the software design documents within a distributed development team. The issues include the format, distribution and evolution of data. This paper mainly focu...
Junichi Suzuki, Yoshikazu Yamamoto
ASPDAC
2006
ACM
93views Hardware» more  ASPDAC 2006»
14 years 1 months ago
Electrothermal analysis and optimization techniques for nanoscale integrated circuits
Abstract— With technology scaling, on-chip power densities are growing steadily, leading to the point where temperature has become an important consideration in the design of ele...
Yong Zhan, Brent Goplen, Sachin S. Sapatnekar
TON
2010
157views more  TON 2010»
13 years 2 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle