Sciweavers

38 search results - page 3 / 8
» Operating System Interface Obfuscation and the Revealing of ...
Sort
View
CSCW
2010
ACM
14 years 2 months ago
Why the plan doesn't hold: a study of situated planning, articulation and coordination work in a surgical ward
Most studies of plans and situated work have applied ethnographic methods and and thus fail to provide any quantitative insight into the extent of this phenomenon. We present a st...
Jakob E. Bardram, Thomas Riisgaard Hansen
CHI
1994
ACM
13 years 8 months ago
Toolglass and magic lenses: the see-through interface
ToolglassTM widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positione...
Eric A. Bier, Maureen C. Stone, Kenneth A. Pier, K...
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
13 years 11 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
SIGCOMM
2012
ACM
11 years 7 months ago
User-level data center tomography
Measurement and inference in data centers present a set of opportunities and challenges distinct from the Internet domain. Existing toolsets may be perturbed or be mislead by issu...
Neil Alexander Twigg, Marwan Fayed, Colin Perkins,...
HAPTICS
2002
IEEE
13 years 10 months ago
Building a Task Language for Segmentation and Recognition of User Input to Cooperative Manipulation Systems
We present the results of using Hidden Markov Models (HMMs) for automatic segmentation and recognition of user motions. Previous work on recognition of user intent with man/machin...
C. Sean Hundtofte, Gregory D. Hager, Allison M. Ok...