Sciweavers

2208 search results - page 228 / 442
» Memory Practices in the Sciences
Sort
View
ACMSE
2006
ACM
15 years 5 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
ACMSE
2006
ACM
15 years 5 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
CSCW
2006
ACM
15 years 4 months ago
SIDES: a cooperative tabletop computer game for social skills development
This paper presents a design case study of SIDES: Shared Interfaces to Develop Effective Social Skills. SIDES is a tool designed to help adolescents with Asperger’s Syndrome pra...
Anne Marie Piper, Eileen O'Brien, Meredith Ringel ...
CSCW
2006
ACM
15 years 4 months ago
From the war room to the living room: decision support for home-based therapy teams
Teams of therapists often provide targeted interventions for children with developmental disabilities. A common practice in these cases is one-on-one interaction between a therapi...
Julie A. Kientz, Gillian R. Hayes, Gregory D. Abow...
CSCW
2006
ACM
15 years 4 months ago
Identification of coordination requirements: implications for the Design of collaboration and awareness tools
Task dependencies drive the need to coordinate work activities. We describe a technique for using automatically generated archival data to compute coordination requirements, i.e.,...
Marcelo Cataldo, Patrick Wagstrom, James D. Herbsl...