Sciweavers

838 search results - page 153 / 168
» Designing effective cyber store user interface
Sort
View
54
Voted
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
TRIDENTCOM
2005
IEEE
15 years 3 months ago
A Testbed for Evaluating Human Interaction with Ubiquitous Computing Environments
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
WIKIS
2005
ACM
15 years 3 months ago
Are wikis usable?
Wikis are simple to use, asynchronous, Web-based collaborative hypertext authoring systems which are quickly gaining in popularity. In spite of much anecdotal evidence to the effe...
Alain Désilets, Sébastien Paquet, No...
85
Voted
MM
2003
ACM
145views Multimedia» more  MM 2003»
15 years 2 months ago
Proscenium: a framework for spatio-temporal video editing
We present an approach to video editing where movie sequences are treated as spatio-temporal volumes that can be sheered and warped under user control. This simple capability enab...
Eric P. Bennett, Leonard McMillan
ICSE
2010
IEEE-ACM
15 years 2 months ago
Codebook: discovering and exploiting relationships in software repositories
Large-scale software engineering requires communication and collaboration to successfully build and ship products. We conducted a survey with Microsoft engineers on inter-team coo...
Andrew Begel, Yit Phang Khoo, Thomas Zimmermann