Sciweavers

7741 search results - page 1417 / 1549
» Security in Active Networks
Sort
View
ICCAD
2002
IEEE
113views Hardware» more  ICCAD 2002»
16 years 1 months ago
Interconnect-aware high-level synthesis for low power
Abstract—Interconnects (wires, buffers, clock distribution networks, multiplexers and busses) consume a significant fraction of total circuit power. In this work, we demonstrat...
Lin Zhong, Niraj K. Jha
149
Voted
CSCW
2010
ACM
16 years 1 months ago
Same places, same things, same people?: mining user similarity on social media
In this work we examine nine different sources for user similarity as reflected by activity in social media applications. We suggest a classification of these sources into three c...
Ido Guy, Michal Jacovi, Adam Perer, Inbal Ronen, E...
141
Voted
CHI
2010
ACM
15 years 11 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner
163
Voted
SAC
2010
ACM
15 years 11 months ago
Social music making on the web with CODES
Music making is usually considered as mostly a solitary activity done by composers, but with the current Web 2.0 technology it is possible to provide new possibilities for social ...
Evandro Manara Miletto, Marcelo Soares Pimenta, Je...
TEI
2010
ACM
199views Hardware» more  TEI 2010»
15 years 11 months ago
Revealing the invisible: visualizing the location and event flow of distributed physical devices
Distributed physical user interfaces comprise networked sensors, actuators and other devices attached to a variety of computers in different locations. Developing such systems is ...
Nicolai Marquardt, Tom Gross, M. Sheelagh T. Carpe...
« Prev « First page 1417 / 1549 Last » Next »