Sciweavers

2904 search results - page 184 / 581
» Valuing Design Repair
Sort
View
143
Voted
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
13 years 10 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
110
Voted
CHI
2009
ACM
15 years 9 months ago
Interactivity attributes: a new way of thinking and describing interactivity
We propose a new perspective, seeing interactivity that is the immaterial part of an interactive artifact as something concretely describable and perceivable as we do with physica...
Youn-Kyung Lim, Sang-Su Lee, Kwang-young Lee
76
Voted
FCCM
2003
IEEE
92views VLSI» more  FCCM 2003»
15 years 8 months ago
Perturbation Analysis for Word-length Optimization
This paper introduces a design tool and its associated procedures for determining the sensitivity of outputs in a digital signal processing design to small errors introduced by ro...
George A. Constantinides
CGI
2004
IEEE
15 years 6 months ago
Using Poxels for Reproducing Traditional Pierced Byzantine Jewellery
We present ByzantineCAD, a feature-based parametric CAD system for designing pierced Byzantine jewellery. ByzantineCAD is an automated system where jewellery is designed according...
Vasiliki Stamati, Ioannis Fudos, Sofia Theodoridou...
115
Voted
JTAER
2007
123views more  JTAER 2007»
15 years 2 months ago
Business Model Scenarios for Remote Management
This article critically appraises business model challenges in implementing remote management functionalities. Remote management is believed to create new service opportunities an...
Olivier Braet, Pieter Ballon