Sciweavers

1791 search results - page 256 / 359
» Behavioral Operations
Sort
View
UIST
2000
ACM
15 years 7 months ago
Fluid sketches: continuous recognition and morphing of simple hand-drawn shapes
We describe a new sketching interface in which shape recognition and morphing are tightly coupled. Raw input strokes are continuously morphed into ideal geometric shapes, even bef...
James Arvo, Kevin Novins
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 7 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
ACSAC
1999
IEEE
15 years 7 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
APSEC
1999
IEEE
15 years 7 months ago
Enhancing the Object Constraint Language for More Expressive Specifications
The Object Constraint Language (OCL) is a precise language which could be used for describing constraints on object-oriented models and other modelling artifacts. The kind of cons...
Ali Hamie
IUI
1999
ACM
15 years 7 months ago
Opportunistic Exploration of Large Consumer Product Spaces
The advent of the Web has brought an unprecedented amount of information together with a large, diverse set of users. Online users are performing a wider variety of tasks than eve...
Doug Bryan, Anatole Gershman