Sciweavers

557 search results - page 62 / 112
» Two experiences designing for effective security
Sort
View
VR
2003
IEEE
117views Virtual Reality» more  VR 2003»
14 years 2 months ago
Evaluation of the ShapeTape Tracker for Wearable, Mobile Interaction
In this paper we describe two engineering experiments designed to evaluate the effectiveness of Measurand’s ShapeTape for wearable, mobile interaction. Our initial results sugge...
Yohan Baillot, Joshua J. Eliason, Greg S. Schmidt,...
POPL
1996
ACM
14 years 26 days ago
A Practical and Flexible Flow Analysis for Higher-Order Languages
operators. The analysis is abstract interpretation-based and is parameterized over two polyvariance operators and a projection operator. These operators are used to regulate the sp...
J. Michael Ashley
ASPDAC
2007
ACM
89views Hardware» more  ASPDAC 2007»
14 years 22 days ago
Trace Compaction using SAT-based Reachability Analysis
In today's designs, when functional verification fails, engineers perform debugging using the provided error traces. Reducing the length of error traces can help the debugging...
Sean Safarpour, Andreas G. Veneris, Hratch Mangass...
WICSA
2004
13 years 10 months ago
Understanding Tradeoffs among Different Architectural Modeling Approaches
Over the past decade a number of architecture description languages (ADLs) have been proposed to facilitate modeling and analysis of software architecture. While each claims to ha...
Roshanak Roshandel, Bradley R. Schmerl, Nenad Medv...
ICASSP
2010
IEEE
13 years 9 months ago
Optimizing spectral subtraction and wiener filtering for robust speech recognition in reverberant and noisy conditions
Speech enhancement is a common approach to address the effects of degradation due to noise and channel contamination. This approach is intended to suppress unwanted signal and rec...
Randy Gomez, Tatsuya Kawahara