Sciweavers

1635 search results - page 219 / 327
» Design Productivity for Configurable Computing
Sort
View
NDSS
2002
IEEE
15 years 6 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
DPPI
2007
ACM
15 years 5 months ago
From entry to access: how shareability comes about
Abstract. Shareability is a design principle that refers to how a system, interface, or device engages a group of collocated, co-present users in shared interactions around the sam...
Eva Hornecker, Paul Marshall, Yvonne Rogers
CHI
2010
ACM
15 years 3 months ago
Countertop responsive mirror: supporting physical retail shopping for sellers, buyers and companions
We examine opportunities for ubiquitous technologies in retail shopping, jewelry shopping in this case, to supplement the unique information needs inherent to physical trials of t...
Maurice Chu, Brinda Dalal, Alan Walendowski, Bo Be...
HUC
2010
Springer
15 years 2 months ago
Beyond context-awareness: context prediction in an industrial application
In this paper, we discuss the benefits of context prediction for an industrial application in open cast mining. The goal of context prediction is not only to recognize the current...
Yong Ding, Hedda Rahel Schmidtke, Michael Beigl
CAD
2005
Springer
15 years 1 months ago
Reconstruction of 3D interacting solids of revolution from 2D orthographic views
3D CAD is replacing 2D CAD to improve efficiency of product design and manufacturing. Therefore, converting legacy 2D drawings into 3D solid models is required. CSG based approach...
Hanmin Lee, Soonhung Han