Sciweavers

782 search results - page 116 / 157
» Ethnographically informed analysis for software engineers
Sort
View
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
PLDI
2006
ACM
15 years 5 months ago
Free-Me: a static analysis for automatic individual object reclamation
Garbage collection has proven benefits, including fewer memoryrelated errors and reduced programmer effort. Garbage collection, however, trades space for time. It reclaims memory...
Samuel Z. Guyer, Kathryn S. McKinley, Daniel Framp...
BMCBI
2008
133views more  BMCBI 2008»
14 years 12 months ago
SPIKE - a database, visualization and analysis tool of cellular signaling pathways
Background: Biological signaling pathways that govern cellular physiology form an intricate web of tightly regulated interlocking processes. Data on these regulatory networks are ...
Ran Elkon, Rita Vesterman, Nira Amit, Igor Ulitsky...
SIGDOC
2004
ACM
15 years 5 months ago
Liability for defective content
Software publishers and information service providers publish information about their own products and about other products and people. Additional content might be incidental, suc...
Cem Kaner
CHI
2004
ACM
16 years 7 days ago
Designing smooth connections between worlds
Currently there is a lack of explicit theories and few detailed guidelines to support the development of Mixed Reality (MR) technology and its varied applications. This research f...
Daniela Gorski Trevisan