Sciweavers

863 search results - page 126 / 173
» A goal-oriented web browser
Sort
View
CN
1998
119views more  CN 1998»
13 years 9 months ago
The Order of Things: Activity-Centred Information Access,
This paper focuses on the representation and access of Web-based information, and how to make such a representation adapt to the activities or interests of individuals within a co...
Matthew Chalmers, Kerry Rodden, Dominique Brodbeck
CONCURRENCY
1998
107views more  CONCURRENCY 1998»
13 years 9 months ago
CEV: collaborative environment for visualization using Java RMI
Collaborative visualization is an active area of research in computer science. Many di erent techniques and implementations have been proposed. However, most of today's syste...
Rajeev R. Raje, Michael Boyles, Shiaofen Fang
TSE
2002
115views more  TSE 2002»
13 years 9 months ago
Simplifying and Isolating Failure-Inducing Input
Given some test case, a program fails. Which circumstances of the test case are responsible for the particular failure? The Delta Debugging algorithm generalizes and simplifies som...
Andreas Zeller, Ralf Hildebrandt
SAC
2008
ACM
13 years 9 months ago
Toward quality requirements analysis based on domain specific quality spectrum
It is difficult to identify whether quality requirements are defined adequately or not, but there are few methods to support this kind of requirements analysis. In this paper, we ...
Haruhiko Kaiya, Tomonori Sato, Akira Osada, Naoyuk...
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 7 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...