Sciweavers

1888 search results - page 307 / 378
» Information Distance
Sort
View
CCS
2008
ACM
14 years 11 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
CHI
2010
ACM
14 years 11 months ago
The family window: the design and evaluation of a domestic media space
Families have a strong need to connect with their loved ones over distance. However, most technologies do not provide the same feelings of connectedness that one feels from seeing...
Tejinder K. Judge, Carman Neustaedter, Andrew F. K...
CEC
2007
IEEE
14 years 11 months ago
Fitness inheritance in evolutionary and multi-objective high-level synthesis
Abstract—The high-level synthesis process allows the automatic design and implementation of digital circuits starting from a behavioral description. Evolutionary algorithms are v...
Christian Pilato, Gianluca Palermo, Antonino Tumeo...
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
14 years 11 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
BCSHCI
2007
14 years 11 months ago
eKISS: sharing experiences in families through a picture blog
Contemporary family life can be very stressful and many families are often busy and separated by time or distance. Physical separation makes it difficult to maintain an awareness ...
Thomas Dalsgaard, Mikael B. Skov, Bo Ramsdahl Thom...