Sciweavers

1242 search results - page 158 / 249
» The Theory of Grammar Constraints
Sort
View
93
Voted
CHI
2005
ACM
16 years 1 months ago
Breaking the laws of action in the user interface
Fitts' law, Steering law and Law of crossing, collectively known as the laws of action, model the speed-accuracy tradeoffs in common HCI tasks. These laws impose a certain sp...
Per Ola Kristensson
215
Voted
POPL
2004
ACM
16 years 1 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
116
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Compressive coded aperture superresolution image reconstruction
Recent work in the emerging field of compressive sensing indicates that, when feasible, judicious selection of the type of distortion induced by measurement systems may dramatica...
Roummel F. Marcia, Rebecca Willett
FROCOS
2007
Springer
15 years 7 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
115
Voted
GLOBECOM
2006
IEEE
15 years 6 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...