Sciweavers

3954 search results - page 513 / 791
» Image-based Model Completion
Sort
View
169
Voted
CAV
2009
Springer
209views Hardware» more  CAV 2009»
16 years 5 months ago
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers
Context-bounded analysis is an attractive approach to verification of concurrent programs. Bounding the number of contexts executed per thread not only reduces the asymptotic compl...
Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamari...
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
16 years 5 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
CHI
2007
ACM
16 years 4 months ago
Endpoint prediction using motion kinematics
Recently proposed novel interaction techniques such as cursor jumping [1] and target expansion for tiled arrangements [13] are predicated on an ability to effectively estimate the...
Edward Lank, Yi-Chun Nikko Cheng, Jaime Ruiz
CHI
2002
ACM
16 years 4 months ago
Acquisition of expanding targets
There exist several user interface widgets that dynamically grow in size in response to the user's focus of attention. Some of these, such as icons in toolbars, expand to fac...
Michael J. McGuffin, Ravin Balakrishnan
RECOMB
2005
Springer
16 years 4 months ago
Likely Scenarios of Intron Evolution
Whether common ancestors of eukaryotes and prokaryotes had introns is one of the oldest unanswered questions in molecular evolution. Recently completed genome sequences have been u...
Miklós Csürös