Sciweavers

15777 search results - page 3063 / 3156
» The Reformulation-Optimization Software Engine
Sort
View
CHI
2006
ACM
16 years 8 days ago
Interacting with communication appliances: an evaluation of two computer vision-based selection techniques
Communication appliances, intended for home settings, require intuitive forms of interaction. Computer vision offers a potential solution, but is not yet sufficiently accurate.As ...
Jacob Eisenstein, Wendy E. Mackay
CHI
2005
ACM
16 years 8 days ago
Comparing usability problems and redesign proposals as input to practical systems development
Usability problems predicted by evaluation techniques are useful input to systems development; it is uncertain whether redesign proposals aimed at alleviating those problems are l...
Erik Frøkjær, Kasper Hornbæk
POPL
2008
ACM
16 years 6 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
POPL
2007
ACM
16 years 6 days ago
Preferential path profiling: compactly numbering interesting paths
Path profiles provide a more accurate characterization of a program's dynamic behavior than basic block or edge profiles, but are relatively more expensive to collect. This h...
Kapil Vaswani, Aditya V. Nori, Trishul M. Chilimbi
POPL
2007
ACM
16 years 6 days ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
« Prev « First page 3063 / 3156 Last » Next »