Sciweavers

740 search results - page 94 / 148
» Experiments on Supporting Interactive Proof Using Resolution
Sort
View
CHI
2009
ACM
16 years 2 months ago
Sacred imagery in techno-spiritual design
Despite increased knowledge about how Information and Communications Technologies (ICTs) are used to support religious and spiritual practices, designers know little about how to ...
Susan Wyche, Kelly E. Caine, Benjamin K. Davison, ...
ICSE
1998
IEEE-ACM
15 years 5 months ago
Exploiting an Event-Based Infrastructure to Develop Complex Distributed Systems
The development of complex distributed systems demands for the creation of suitable architectural styles (or paradigms) and related run-time infrastructures. An emerging style tha...
Gianpaolo Cugola, Elisabetta Di Nitto, Alfonso Fug...
WWW
2007
ACM
16 years 2 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
CHI
2007
ACM
16 years 1 months ago
Storytelling alice motivates middle school girls to learn computer programming
We describe Storytelling Alice, a programming environment that introduces middle school girls to computer programming as a means to the end of creating 3D animated stories. Storyt...
Caitlin Kelleher, Randy F. Pausch, Sara B. Kiesler
CHI
2007
ACM
15 years 5 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...