: The paper deals with wireless data services and their importance in the enterprise world. Provisioning in difficult-to-reach areas of tall buildings is challenging. To extend cov...
William Ramirez, Fotios C. Harmantzis, Venkata Pra...
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
This paper describes an ongoing project with the goal of designing and implementing a method to evaluate visualizations based on the tasks supported. The method evaluates time to ...
Octavio Juarez Espinosa, Chris Hendrickson, James ...
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
This paper reflects on the design value that emerges from evaluation methods used in the field of child computer interaction. The work is based around an evaluation study of a tan...