Sciweavers

198 search results - page 1 / 40
» Permissive interfaces
Sort
View
SIGSOFT
2005
ACM
14 years 5 months ago
Permissive interfaces
A modular program analysis considers components independently and provides succinct summaries for each component, which can be used when checking the rest of the system. Consider ...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar
CHI
2005
ACM
14 years 5 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
FASE
2009
Springer
13 years 8 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
DSN
2005
IEEE
13 years 10 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
VLDB
1998
ACM
120views Database» more  VLDB 1998»
13 years 9 months ago
KODA - The Architecture And Interface of a Data Model Independent Kernel
In this paper we describe the architecture and interface of KODA, a production strength database kernel. KODA is unique in the industry in its ability to support two different dat...
Gopalan Arun, Ashok Joshi