6 papers:
- DAC-2013-WeiP #detection #hardware
- The undetectable and unprovable hardware trojan horse (SW, MP), p. 2.
- DAC-2012-WeiLKP #benchmark #hardware #metric
- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (SW, KL, FK, MP), pp. 90–95.
- CSCW-2012-EiriksdottirKCMMXP #comprehension #game studies #health #multi #pervasive
- This is not a one-horse race: understanding player types in multiplayer pervasive health games for youth (EE, DK, RC, EDM, ADM, YX, ESP), pp. 843–852.
- DAC-2009-PotkonjakNNM #detection #hardware #using
- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
- ITiCSE-2005-SternMH #how #student
- You can lead a horse to water: how students really use pedagogical software (LS, SM, RH), pp. 246–250.
- HCI-SEC-1997-Hollnagel #question
- Building Joint Cognitive Systems: A Case of Horses for Courses? (EH), pp. 39–42.