Sciweavers

1555 search results - page 48 / 311
» When the implication is not to design (technology)
Sort
View
109
Voted
ACSW
2007
15 years 2 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
107
Voted
DATE
1999
IEEE
129views Hardware» more  DATE 1999»
15 years 4 months ago
Battery-Powered Digital CMOS Design
In this paper, we consider the problem of maximizing the battery life (or duration of service) in battery-powered CMOS circuits. We first show that the battery efficiency (or utili...
Massoud Pedram, Qing Wu
102
Voted
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
15 years 5 months ago
Evaluating Support for Improvisation in Simulated Emergency Scenarios
Technological systems involving hazards are typically managed by experienced personnel guided by wellformulated, pre-determined procedures. These procedures are designed to ensure...
David Mendonça, Giampiero E. G. Beroggi, Wi...
109
Voted
AIIDE
2008
15 years 2 months ago
Automatic Generation of Game Level Solutions as Storyboards
Interactive Storytelling techniques are attracting much interest for their potential to develop new game genres but also as another form of procedural content generation, specific...
David Pizzi, Marc Cavazza, Alex Whittaker, Jean-Lu...
113
Voted
HUC
2004
Springer
15 years 6 months ago
Everyday Encounters with Context-Aware Computing in a Campus Environment
As ubiquitous computing technologies mature, they must move out of laboratory settings and into the everyday world. In the process, they will increasingly be used by heterogeneous ...
Louise Barkhuus, Paul Dourish