Sciweavers

889 search results - page 126 / 178
» Data Resource Selection in Distributed Visual Information Sy...
Sort
View
IUI
2010
ACM
14 years 3 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
BIRTE
2006
139views Business» more  BIRTE 2006»
14 years 24 days ago
Quality Contracts for Real-Time Enterprises
Real-time enterprises rely on user queries being answered in a timely fashion and using fresh data. This is relatively easy when systems are lightly loaded and both queries and upd...
Alexandros Labrinidis, Huiming Qu, Jie Xu
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 29 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ACSW
2004
13 years 10 months ago
Monitoring and controlling of a multi - agent based workflow system
Business processes are often likely to undergo drastic changes and hence the workflow systems that model, simulate and enact these processes should support the monitoring and cont...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...
SOFTVIS
2010
ACM
13 years 9 months ago
Towards anomaly comprehension: using structural compression to navigate profiling call-trees
Developers must often diagnose anomalies in programs they only have a partial knowledge of. As a result, they must simultaneously reverse engineer parts of the system they are unf...
Shen Lin 0003, François Taïani, Thomas...