Sciweavers

2635 search results - page 93 / 527
» Computing multihomogeneous resultants using straight-line pr...
Sort
View
CHI
2011
ACM
14 years 7 months ago
Creek watch: pairing usefulness and usability for successful citizen science
Citizen science projects can collect a wealth of scientific data, but that data is only helpful if it is actually used. While previous citizen science research has mostly focused ...
Sunyoung Kim, Christine Robson, Thomas Zimmerman, ...
CSFW
2007
IEEE
15 years 10 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CHI
2009
ACM
16 years 4 months ago
Two studies of opportunistic programming: interleaving web foraging, learning, and writing code
This paper investigates the role of online resources in problem solving. We look specifically at how programmers--an exemplar form of knowledge workers--opportunistically interlea...
Joel Brandt, Philip J. Guo, Joel Lewenstein, Mira ...
TACAS
2009
Springer
135views Algorithms» more  TACAS 2009»
15 years 10 months ago
Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads
Context-bounded analysis has been shown to be both efficient and effective at finding bugs in concurrent programs. According to its original definition, context-bounded analysis...
Mohamed Faouzi Atig, Ahmed Bouajjani, Shaz Qadeer
PARA
2004
Springer
15 years 9 months ago
A Tool to Display Array Access Patterns in OpenMP Programs
Abstract. A program analysis tool can play an important role in helping users understand and improve OpenMP codes. Array privatization is one of the most effective ways to improve...
Oscar Hernandez, Chunhua Liao, Barbara M. Chapman