Sciweavers

6300 search results - page 895 / 1260
» We have it easy, but do we have it right
Sort
View
WWW
2010
ACM
15 years 9 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
15 years 9 months ago
Optimal Tableau Algorithms for Coalgebraic Logics
Deciding whether a modal formula is satisfiable with respect to a given set of (global) assumptions is a question of fundamental importance in applications of logic in computer sc...
Rajeev Goré, Clemens Kupke, Dirk Pattinson
CHI
2010
ACM
15 years 8 months ago
Reactive information foraging for evolving goals
Information foraging models have predicted the navigation paths of people browsing the web and (more recently) of programmers while debugging, but these models do not explicitly m...
Joseph Lawrance, Margaret M. Burnett, Rachel K. E....
HRI
2010
ACM
15 years 8 months ago
Investigating multimodal real-time patterns of joint attention in an hri word learning task
Abstract—Joint attention – the idea that humans make inferences from observable behaviors of other humans by attending to the objects and events that these others humans attend...
Chen Yu, Matthias Scheutz, Paul W. Schermerhorn
120
Voted
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 8 months ago
Are There Contagion Effects in the Diffusion of IT Outsourcing?
Growth in the IT outsourcing industry during the past ten years has been exceptional. In this study, we theorize about and analyze the growth patterns of IT outsourcing at the leve...
Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie ...