We revisit the design space of visualizations aiming at identifying and relating its components. In this sense, we establish a model to examine the process through which visualiza...
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
— Lowering supply voltage is an effective technique for power reduction in memory design, however traditional memory cell design fails to operate, as shown in [3], [10], at ultra...
Jawar Singh, Jimson Mathew, Dhiraj K. Pradhan, Sar...
—We describe and analyze the process of requirements development in scenario-based design through consideration of a case study. In our project, a group of teachers and system de...
John M. Carroll, Mary Beth Rosson, George Chin Jr....
Abstract: Visualizing data by graphing a response against certain factors, and conditioning on other factors, has arisen independently in many contexts. One is the interaction plot...
Montserrat Fuentes, Bowei Xi, William S. Cleveland