Sciweavers

2375 search results - page 392 / 475
» Analyze Grid from the Perspective of a Computing System
Sort
View
RTA
2011
Springer
14 years 19 days ago
Modular Termination Proofs of Recursive Java Bytecode Programs by Term Rewriting
In [5, 15] we presented an approach to prove termination of non-recursive Java Bytecode (JBC) programs automatically. Here, JBC programs are first transformed to finite terminat...
Marc Brockschmidt, Carsten Otto, Jürgen Giesl
CHI
2008
ACM
15 years 10 months ago
It's Mine, Don't Touch!: interactions at a large multi-touch display in a city centre
We present data from detailed observations of CityWall, a large multi-touch display installed in a central location in Helsinki, Finland. During eight days of installation, 1199 p...
Peter Peltonen, Esko Kurvinen, Antti Salovaara, Gi...
CHI
2006
ACM
15 years 10 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
ISEUD
2009
Springer
15 years 4 months ago
Mutual Development: A Case Study in Customer-Initiated Software Product Development
The paper is a case study of customer-initiated software product development. We have observed and participated in system development activities in a commercial software house (com...
Renate Andersen, Anders I. Mørch
ICON
2007
IEEE
15 years 4 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen