Sciweavers

2904 search results - page 33 / 581
» Valuing Design Repair
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
ICCAD
2010
IEEE
108views Hardware» more  ICCAD 2010»
13 years 6 months ago
Mathematical yield estimation for two-dimensional-redundancy memory arrays
Defect repair has become a necessary process to enhance the overall yield for memories since manufacturing a natural good memory is difficult in current memory technologies. This ...
Mango Chia-Tso Chao, Ching-Yu Chin, Chen-Wei Lin
CPAIOR
2004
Springer
14 years 2 months ago
Super Solutions in Constraint Programming
To improve solution robustness, we introduce the concept of super solutions to constraint programming. An (a, b)-super solution is one in which if a variables lose their values, th...
Emmanuel Hebrard, Brahim Hnich, Toby Walsh
CHI
2011
ACM
13 years 19 days ago
Improving the safety of homeless young people with mobile phones: values, form and function
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder ...
Jill Palzkill Woelfer, Amy Iverson, David G. Hendr...
CSCW
2011
ACM
13 years 17 days ago
Understanding technology choices and values through social class
This ethnographic study of 22 diverse families in the San Francisco Bay Area explores parents’ attitudes about their children’s use of technology. We found that parents from d...
Morgan G. Ames, Janet Go, Joseph Kaye, Mirjana Spa...