Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
—A full-custom design of AES SubByte module based on Sense Amplifier Based Logic is proposed in this paper. Power consumption of this design is independent of both value and sequ...
—Gel is a hardware description language that enables quick scripting of high level designs and can be easily extended to new design patterns. It is expression oriented and extrem...
This paper introduces a “design mixer” approach to usercentred interactive software design. This method overcomes the limits of a design process that favours the handling/mana...
Video and transcripts of two architectural design meetings are presented in an analysis of a specific design process. The focus of the analysis presented here is the social and c...
This paper describes an interface for assisting the design and production of pop-up cards by using a computer. A pop-up card is a piece of a folded paper from which a three-dimensi...
Configurable on chip multiprocessor systems combine advantages of task-level parallelism and the flexibility of field-programmable devices to customize architectures for paralle...
Harold Ishebabi, Philipp Mahr, Christophe Bobda, M...
This paper extends the analytic framework Suchman used in Plans and Situated Actions by using it as a tool in the design of interactive, immersive environments that rely on human ...
We present the design of the Snackbot, a robot that will deliver snacks in our university buildings. The robot is intended to provide a useful, continuing service and to serve as ...
Min Kyung Lee, Jodi Forlizzi, Paul E. Rybski, Fred...
Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by endusers, little has been known about the upper bounds of achievable performanc...