Sciweavers

2169 search results - page 323 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
TASLP
2008
112views more  TASLP 2008»
15 years 4 months ago
A Study in Efficiency and Modality Usage in Multimodal Form Filling Systems
The usage patterns of speech and visual input modes are investigated as a function of relative input mode efficiency for both desktop and personal digital assistant (PDA) working ...
Manolis Perakakis, Alexandros Potamianos
VIZSEC
2005
Springer
15 years 10 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
ICCAD
1993
IEEE
139views Hardware» more  ICCAD 1993»
15 years 8 months ago
Hardware/software resolution of pipeline hazards in pipeline synthesis of instruction set processors
— One major problem in pipeline synthesis is the detection and resolution of pipeline hazards. In this paper we present a new solution to the problem in the domain of pipelined a...
Ing-Jer Huang, Alvin M. Despain
ISPD
2006
ACM
126views Hardware» more  ISPD 2006»
15 years 10 months ago
Noise driven in-package decoupling capacitor optimization for power integrity
The existing decoupling capacitance optimization approaches meet constraints on input impedance for package. In this paper, we show that using impedance as constraints leads to la...
Jun Chen, Lei He
INFOCOM
2010
IEEE
15 years 3 months ago
Buffer Management for Aggregated Streaming Data with Packet Dependencies
Abstract—In many applications the traffic traversing the network has inter-packet dependencies due to application-level encoding schemes. For some applications, e.g., multimedia...
Gabriel Scalosub, Peter Marbach, Jörg Liebehe...