Sciweavers

4382 search results - page 641 / 877
» Query by Semantic Example
Sort
View
112
Voted
CHI
2010
ACM
15 years 10 months ago
What would other programmers do: suggesting solutions to error messages
Interpreting compiler errors and exception messages is challenging for novice programmers. Presenting examples of how other programmers have corrected similar errors may help novi...
Björn Hartmann, Daniel MacDougall, Joel Brand...
APSCC
2009
IEEE
15 years 10 months ago
MORSE: A Model-Aware Service Environment
—In a number of scenarios, services generated using a model-driven development (MDD) approach could benefit from “reflective” access to the information in the models from w...
Ta'id Holmes, Uwe Zdun, Schahram Dustdar
123
Voted
CCS
2007
ACM
15 years 9 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk
156
Voted
INEX
2007
Springer
15 years 9 months ago
Overview of the INEX 2007 Entity Ranking Track
Abstract. Many realistic user tasks involve the retrieval of specific entities instead of just any type of documents. Examples of information needs include ‘Countries where one ...
Arjen P. de Vries, Anne-Marie Vercoustre, James A....
SACMAT
2004
ACM
15 years 8 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste