Sciweavers

2604 search results - page 51 / 521
» Human Errors and System Requirements
Sort
View
CHI
2000
ACM
15 years 4 months ago
Providing integrated toolkit-level support for ambiguity in recognition-based interfaces
Interfaces based on recognition technologies are used extensively in both the commercial and research worlds. But recognizers are still error-prone, and this results in human perf...
Jennifer Mankoff, Scott E. Hudson, Gregory D. Abow...
SIGSOFT
2003
ACM
16 years 18 days ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
IAAI
2001
15 years 1 months ago
Interchanging Agents and Humans in Military Simulation
The innovative reapplication of a multi-agent system for human-in-the-loop (HIL) simulation was a consequence of appropriate agent oriented design. The use of intelligent agents f...
Clinton Heinze, Simon Goss, Torgny Josefsson, Kerr...
SECON
2008
IEEE
15 years 6 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
ICCV
2011
IEEE
13 years 12 months ago
Multiclass Recognition and Part Localization with Humans in the Loop
We propose a visual recognition system that is designed for fine-grained visual categorization. The system is composed of a machine and a human user. The user, who is unable to c...
Catherine Wah, Steven Branson, Pietro Perona, Serg...