Sciweavers

450 search results - page 72 / 90
» Design of an Interface for Interactive Topic Detection and T...
Sort
View
SIGSOFT
2003
ACM
14 years 9 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
CHI
2000
ACM
14 years 25 days ago
Tradeoffs in displaying peripheral information
Peripheral information is information that is not central to a person’s current task, but provides the person the opportunity to learn more, to do a better job, or to keep track...
Paul P. Maglio, Christopher S. Campbell
HUC
2010
Springer
13 years 9 months ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
HT
2005
ACM
14 years 2 months ago
Hypervideo expression: experiences with hyper-hitchcock
Hyper-Hitchcock is a hypervideo editor enabling the direct manipulation authoring of a particular form of hypervideo called “detail-on-demand video.” This form of hypervideo a...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...