Sciweavers

60 search results - page 8 / 12
» An analysis and visualization for revealing object sharing
Sort
View
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
PLDI
2012
ACM
12 years 12 months ago
Fully automatic and precise detection of thread safety violations
Concurrent, object-oriented programs often use thread-safe library classes. Existing techniques for testing a thread-safe class either rely on tests using the class, on formal spe...
Michael Pradel, Thomas R. Gross
68
Voted
IWC
2007
121views more  IWC 2007»
14 years 9 months ago
Eye movements as indices for the utility of life-like interface agents: A pilot study
We motivate an approach to evaluating the utility of life-like interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obta...
Helmut Prendinger, Chunling Ma, Mitsuru Ishizuka
174
Voted
ASUNAM
2011
IEEE
13 years 9 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
94
Voted
ECSCW
2003
14 years 10 months ago
System Guidelines for Co-located, Collaborative Work on a Tabletop Display
Collaborative interactions with many existing digital tabletop systems lack the fluidity of collaborating around a table using traditional media. This paper presents a critical ana...
Stacey D. Scott, Karen D. Grant, Regan L. Mandryk