Sciweavers

548 search results - page 56 / 110
» Liberate Computer User from Programming
Sort
View
ACMSE
2006
ACM
15 years 3 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
ACMSE
2005
ACM
14 years 11 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
SC
2009
ACM
15 years 4 months ago
Autotuning multigrid with PetaBricks
Algorithmic choice is essential in any problem domain to realizing optimal computational performance. Multigrid is a prime example: not only is it possible to make choices at the ...
Cy P. Chan, Jason Ansel, Yee Lok Wong, Saman P. Am...
ENTCS
2006
128views more  ENTCS 2006»
14 years 9 months ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi
UIST
2003
ACM
15 years 3 months ago
Stylus input and editing without prior selection of mode
This paper offers a solution to the mode problem in computer sketch/notetaking programs. Conventionally, the user must specify the intended "draw" or "command"...
Eric Saund, Edward Lank