Sciweavers

1494 search results - page 248 / 299
» Less Extreme Programming
Sort
View
SIGSOFT
2004
ACM
16 years 2 months ago
Heuristic-guided counterexample search in FLAVERS
One of the benefits of finite-state verification (FSV) tools, such as model checkers, is that a counterexample is provided when the property cannot be verified. Not all counterexa...
Jianbin Tan, George S. Avrunin, Lori A. Clarke, Sh...
WWW
2008
ACM
16 years 2 months ago
Characterizing typical and atypical user sessions in clickstreams
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and...
Narayanan Sadagopan, Jie Li
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
16 years 2 months ago
Universally utility-maximizing privacy mechanisms
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan
CHI
2009
ACM
16 years 2 months ago
Providing dynamically changeable physical buttons on a visual display
Physical buttons have the unique ability to provide lowattention and vision-free interactions through their intuitive tactile clues. Unfortunately, the physicality of these interf...
Chris Harrison, Scott E. Hudson
MOBIHOC
2009
ACM
16 years 2 months ago
Energy-efficient capture of stochastic events by global- and local-periodic network coverage
We consider a high density of sensors randomly placed in a geographical area for event monitoring. The monitoring regions of the sensors may have significant overlap, and a subset...
Shibo He, Jiming Chen, David K. Y. Yau, Huanyu Sha...