Sciweavers

3316 search results - page 383 / 664
» Mining Software Engineering Data
Sort
View
UIST
1993
ACM
15 years 7 months ago
SpeechSkimmer: Interactively Skimming Recorded Speech
Skimming or browsing audio recordings is much more difficult than visually scanning a document because of the temporal nature of audio. By exploiting properties of spontaneous spe...
Barry Arons
UIST
1990
ACM
15 years 7 months ago
Glyphs: flyweight objects for user interfaces
Current user interface toolkits provide components that are complex and expensive. Programmers cannot use these components for many kinds of application data because the resulting...
Paul R. Calder, Mark A. Linton
COMPSAC
2009
IEEE
15 years 7 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
FSTTCS
2007
Springer
15 years 7 months ago
Efficient and Expressive Tree Filters
Abstract. We investigate streaming evaluation of filters on XML documents, evaluated both at the root node and at an arbitrary node. Motivated by applications in protocol processin...
Michael Benedikt, Alan Jeffrey
ARCS
2006
Springer
15 years 6 months ago
Prototypical Implementation of Location-Aware Services Based on Super-Distributed RFID Tags
Abstract. We provide evidence of the feasibility and effectiveness of a middleware architecture for mobile devices which employs dense distributions of small computerized entities ...
Jürgen Bohn