Sciweavers

2746 search results - page 189 / 550
» Application performance on the Direct Access File System
Sort
View
IUI
2010
ACM
15 years 11 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
UIST
1996
ACM
15 years 8 months ago
Using the Multi-Layer Model for Building Interactive Graphical Applications
Most interactive graphical applications that use direct manipulation are built with low-level libraries such as Xlib because the graphic and interaction models of higher-level too...
Jean-Daniel Fekete, Michel Beaudouin-Lafon
COMPSAC
2010
IEEE
15 years 2 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
SIGSOFT
2005
ACM
15 years 9 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
ICCAD
2005
IEEE
141views Hardware» more  ICCAD 2005»
16 years 1 months ago
Architecture and compilation for data bandwidth improvement in configurable embedded processors
Many commercially available embedded processors are capable of extending their base instruction set for a specific domain of applications. While steady progress has been made in t...
Jason Cong, Guoling Han, Zhiru Zhang