Sciweavers

3392 search results - page 483 / 679
» Using Knowledge Representation to Understand Interactive Sys...
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
15 years 6 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
CHI
2007
ACM
15 years 8 months ago
Aligning development tools with the way programmers think about code changes
Software developers must modify their programs to keep up with changing requirements and designs. Often, a conceptually simple change can require numerous edits that are similar b...
Marat Boshernitsan, Susan L. Graham, Marti A. Hear...
156
Voted
USENIX
2004
15 years 6 months ago
Making the "Box" Transparent: System Call Performance as a First-Class Result
For operating system intensive applications, the ability of designers to understand system call performance behavior is essential to achieving high performance. Conventional perfo...
Yaoping Ruan, Vivek S. Pai
IJHCI
2010
110views more  IJHCI 2010»
15 years 3 months ago
Images of Usability
The term usability is ubiquitous in human-computer interaction, so much so that it is commonly used without definition. Rather than one established meaning of usability, there are,...
Morten Hertzum
OSDI
2006
ACM
16 years 4 months ago
Operating System Profiling via Latency Analysis
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...