Sciweavers

9380 search results - page 1763 / 1876
» Collaborative information system design
Sort
View
DSN
2005
IEEE
15 years 10 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
RTAS
2005
IEEE
15 years 10 months ago
Improving WCET by Optimizing Worst-Case Paths
It is advantageous to perform compiler optimizations to lower the WCET of a task since tasks with lower WCETs are easier to schedule and more likely to meet their deadlines. Compi...
Wankang Zhao, William C. Kreahling, David B. Whall...
ACMSE
2005
ACM
15 years 10 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
MM
2005
ACM
124views Multimedia» more  MM 2005»
15 years 10 months ago
MusicStory: a personalized music video creator
In this paper, we describe MusicStory, a system that automatically creates videos to accompany music with lyrics. MusicStory uses common search engines, photo-sharing websites, an...
David A. Shamma, Bryan Pardo, Kristian J. Hammond
115
Voted
NSPW
2004
ACM
15 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
« Prev « First page 1763 / 1876 Last » Next »