Sciweavers

8030 search results - page 1489 / 1606
» User Interface Softbots
Sort
View
153
Voted
CCS
2008
ACM
15 years 5 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ITP
2010
178views Mathematics» more  ITP 2010»
15 years 5 months ago
Interactive Termination Proofs Using Termination Cores
Recent advances in termination analysis have yielded new methods and tools that are highly automatic. However, when they fail, even experts have difficulty understanding why and de...
Panagiotis Manolios, Daron Vroon
CHI
2008
ACM
15 years 5 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
117
Voted
ASSETS
2005
ACM
15 years 5 months ago
Visualizing non-speech sounds for the deaf
Sounds constantly occur around us, keeping us aware of our surroundings. People who are deaf have difficulty maintaining an awareness of these ambient sounds. We present an invest...
Tara Matthews, Janette Fong, Jennifer Mankoff
125
Voted
ASWC
2006
Springer
15 years 5 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
« Prev « First page 1489 / 1606 Last » Next »