Sciweavers

883 search results - page 47 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
CONCUR
2008
Springer
15 years 1 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
PERVASIVE
2009
Springer
15 years 4 months ago
Users' View on Context-Sensitive Car Advertisements
Cars are ubiquitous and offer large and often highly visible surfaces that can be used as advertising space. Until now, advertising in this domain has focused on commercial vehicle...
Florian Alt, Christoph Evers, Albrecht Schmidt
TMI
2010
94views more  TMI 2010»
14 years 10 months ago
Theoretical Bounds and System Design for Multipinhole SPECT
Abstract—The pinhole camera in single photon emission computed tomography (SPECT) has an inherent trade-off between resolution and sensitivity. Recent systems overcome this to so...
Peter Nillius, Mats Danielsson
MOMM
2009
ACM
162views Communications» more  MOMM 2009»
15 years 4 months ago
Towards an interactive multimedia experience for club music and dance
In this paper, we describe completed and ongoing work towards an interactive multimedia system that will appeal to today’s youth culture identified as most likely to adopt such ...
Dennis Majoe, Irena Kulka, Jan Schacher
PERSUASIVE
2009
Springer
15 years 6 months ago
Design methods for ethical persuasive computing
Value Sensitive Design and Participatory Design are two methodological frameworks that account for ethical issues throughout the process of technology design. Through analysis and...
Janet Davis