Sciweavers

1172 search results - page 139 / 235
» Who killed design
Sort
View
AMI
2009
Springer
14 years 4 months ago
I Bet You Look Good on the Wall: Making the Invisible Computer Visible
The design ideal of the invisible computer, prevalent in the vision of ambient intelligence (AmI), has led to a number of interaction challenges. The complex nature of AmI environm...
Jo Vermeulen, Jonathan Slenders, Kris Luyten, Kari...
CIKM
2009
Springer
14 years 4 months ago
Online anonymity for personalized web services
To receive personalized web services, the user has to provide personal information and preferences, in addition to the query itself, to the web service. However, detailed personal...
Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu
ISW
2009
Springer
14 years 4 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
KESAMSTA
2009
Springer
14 years 4 months ago
An Approximate Model for Bidders in Sequential Automated Auctions
In this paper, we propose a probabilistic model to study the interaction of bidder and seller agents in sequential automated auctions. We consider a designated “special bidder”...
Erol Gelenbe, Kumaara Velan
ASPDAC
2009
ACM
130views Hardware» more  ASPDAC 2009»
14 years 4 months ago
Analog placement with common centroid and 1-D symmetry constraints
— 1In this paper, we will present a placement method for analog circuits. We consider both common centroid and 1-D symmetry constraints, which are the two most common types of pl...
Linfu Xiao, Evangeline F. Y. Young