Sciweavers

18918 search results - page 3618 / 3784
» Using Technology in Teaching
Sort
View
CHI
2001
ACM
16 years 5 months ago
Chinese input with keyboard and eye-tracking: an anatomical study
Chinese input presents unique challenges to the field of human computer interaction. This study provides an anatomical analysis of today's standard Chinese input process, whi...
Jingtao Wang, Shumin Zhai, Hui Su
POPL
2005
ACM
16 years 5 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
OSDI
2006
ACM
16 years 5 months ago
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management
Mismanagement of the persistent state of a system--all the executable files, configuration settings and other data that govern how a system functions--causes reliability problems,...
Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Bra...
VLDB
2004
ACM
104views Database» more  VLDB 2004»
16 years 5 months ago
Retrieval effectiveness of an ontology-based model for information selection
Technology in the field of digital media generates huge amounts of nontextual information, audio, video, and images, along with more familiar textual information. The potential for...
Latifur Khan, Dennis McLeod, Eduard H. Hovy
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 5 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
« Prev « First page 3618 / 3784 Last » Next »