Sciweavers

1425 search results - page 238 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
ICCAD
2000
IEEE
109views Hardware» more  ICCAD 2000»
15 years 2 months ago
Latency-Guided On-Chip Bus Network Design
Abstract— Deep submicron technology scaling has two major ramifications on the design process. First, reduced feature size significantly increases wire delay, thus resulting in...
Milenko Drinic, Darko Kirovski, Seapahn Meguerdich...
TEI
2012
ACM
331views Hardware» more  TEI 2012»
13 years 5 months ago
Body-centric interaction with mobile devices
Most current mobile technologies require on-screen operations for interacting with devices’ visual contents. However, as a trade-off for mobility, screens usually provide limite...
Xiang 'Anthony' Chen
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 3 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
WCRE
1999
IEEE
15 years 2 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
WS
2005
ACM
15 years 3 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du