Sciweavers

15253 search results - page 2730 / 3051
» Integer-Programming Software Systems
Sort
View
CHI
2007
ACM
16 years 4 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2005
ACM
16 years 4 months ago
Extensible input handling in the subArctic toolkit
The subArctic user interface toolkit has extensibility as one of its central goals. It seeks not only to supply a powerful library of reusable interactive objects, but also make i...
Scott E. Hudson, Jennifer Mankoff, Ian E. Smith
CHI
2005
ACM
16 years 4 months ago
Stencils-based tutorials: design and evaluation
Users of traditional tutorials and help systems often have difficulty finding the components described or pictured in the procedural instructions. Users also unintentionally miss ...
Caitlin Kelleher, Randy Pausch
154
Voted
HPCA
2005
IEEE
16 years 4 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
HPCA
2002
IEEE
16 years 4 months ago
Microarchitectural Simulation and Control of di/dt-induced Power Supply Voltage Variation
As the power consumption of modern highperformance microprocessors increases beyond 100W, power becomes an increasingly important design consideration. This paper presents a novel...
Ed Grochowski, David Ayers, Vivek Tiwari
« Prev « First page 2730 / 3051 Last » Next »