Sciweavers

154 search results - page 15 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
AUIC
2006
IEEE
15 years 8 months ago
From pushing buttons to play and progress: value and interaction in fable
A value can be understood as a belief that one mode of conduct is preferable to others. The user-interface of computer games mediates all player conduct in the game and is therefo...
Pippin Barr, James Noble, Robert Biddle, Rilla Kha...
ATS
2005
IEEE
121views Hardware» more  ATS 2005»
15 years 7 months ago
Compressing Functional Tests for Microprocessors
In the past, test data volume reduction techniques have concentrated heavily on scan test data content. However, functional vectors continue to be utilized because they target uni...
Kedarnath J. Balakrishnan, Nur A. Touba, Srinivas ...
TC
2010
14 years 8 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
ICMCS
2006
IEEE
136views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Motion Aligned Spatial Scalable Video Coding
A motion aligned spatial scalable video coding scheme (MA-SSC) is proposed in this paper. Different from the traditional spatial scalable coding schemes derived from MPEG-2, in th...
Debing Liu, Yuwen He, Shipeng Li, Debin Zhao, Wen ...
HF
2007
131views more  HF 2007»
15 years 1 months ago
Formal Analysis and Automatic Generation of User Interfaces: Approach, Methodology, and an Algorithm
In this paper we propose a formal approach and methodology for analysis and generation of human-machine interfaces, with special emphasis on human-automation interaction. Our appr...
Michael Heymann, Asaf Degani