Sciweavers

1211 search results - page 166 / 243
» Computing Manipulations of Ranking Systems
Sort
View
ESOP
2005
Springer
14 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
CHI
2005
ACM
14 years 10 months ago
Intelligent lighting for a better gaming experience
Lighting assumes many aesthetic and communicative functions in game environments that affect attention, immersion, visibility, and emotions. Game environments are dynamic and high...
Magy Seif El-Nasr, Joseph A. Zupko, Keith Miron
CSE
2009
IEEE
14 years 4 months ago
A Visual Interface for Social Information Filtering
Abstract—Collaborative or “Social” filtering has been successfully deployed over the years as a technique for analysing large amounts of user-preference knowledge to predict...
John O'Donovan, Brynjar Gretarsson, Svetlin Bostan...
SEFM
2007
IEEE
14 years 4 months ago
Hardness for Explicit State Software Model Checking Benchmarks
Directed model checking algorithms focus computation resources in the error-prone areas of concurrent systems. The algorithms depend on some empirical analysis to report their per...
Neha Rungta, Eric G. Mercer
IMR
2005
Springer
14 years 3 months ago
Design and Implementation of a Corporate Mesh Object
Today, finite element technologies allow engineers to analyze complex assemblies and subsystems. With CPU power constantly increasing, it is not unreasonable to state that the eng...
John Svitek, Wa Kwok, Joseph R. Tristano