Sciweavers

1555 search results - page 48 / 311
» When the implication is not to design (technology)
Sort
View
ACSW
2007
13 years 9 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
DATE
1999
IEEE
129views Hardware» more  DATE 1999»
14 years 1 days ago
Battery-Powered Digital CMOS Design
In this paper, we consider the problem of maximizing the battery life (or duration of service) in battery-powered CMOS circuits. We first show that the battery efficiency (or utili...
Massoud Pedram, Qing Wu
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 1 months ago
Evaluating Support for Improvisation in Simulated Emergency Scenarios
Technological systems involving hazards are typically managed by experienced personnel guided by wellformulated, pre-determined procedures. These procedures are designed to ensure...
David Mendonça, Giampiero E. G. Beroggi, Wi...
AIIDE
2008
13 years 10 months ago
Automatic Generation of Game Level Solutions as Storyboards
Interactive Storytelling techniques are attracting much interest for their potential to develop new game genres but also as another form of procedural content generation, specific...
David Pizzi, Marc Cavazza, Alex Whittaker, Jean-Lu...
HUC
2004
Springer
14 years 1 months ago
Everyday Encounters with Context-Aware Computing in a Campus Environment
As ubiquitous computing technologies mature, they must move out of laboratory settings and into the everyday world. In the process, they will increasingly be used by heterogeneous ...
Louise Barkhuus, Paul Dourish