Sciweavers

2169 search results - page 24 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
IJMC
2007
40views more  IJMC 2007»
15 years 1 months ago
Valuing wireless data services solutions for corporate clients using real options
: The paper deals with wireless data services and their importance in the enterprise world. Provisioning in difficult-to-reach areas of tall buildings is challenging. To extend cov...
William Ramirez, Fotios C. Harmantzis, Venkata Pra...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 2 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
110
Voted
IV
2000
IEEE
112views Visualization» more  IV 2000»
15 years 6 months ago
Evaluating Visualizations Based on the Performed Task
This paper describes an ongoing project with the goal of designing and implementing a method to evaluate visualizations based on the tasks supported. The method evaluates time to ...
Octavio Juarez Espinosa, Chris Hendrickson, James ...
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 8 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
BCSHCI
2007
15 years 3 months ago
Design in evaluation: reflections on designing for children's technology
This paper reflects on the design value that emerges from evaluation methods used in the field of child computer interaction. The work is based around an evaluation study of a tan...
Emanuela Mazzone, Diana Yifan Xu, Janet C. Read