Sciweavers

15777 search results - page 3078 / 3156
» Engineering in Software
Sort
View
CHI
2006
ACM
14 years 10 months ago
Interacting with communication appliances: an evaluation of two computer vision-based selection techniques
Communication appliances, intended for home settings, require intuitive forms of interaction. Computer vision offers a potential solution, but is not yet sufficiently accurate.As ...
Jacob Eisenstein, Wendy E. Mackay
CHI
2005
ACM
14 years 10 months ago
Comparing usability problems and redesign proposals as input to practical systems development
Usability problems predicted by evaluation techniques are useful input to systems development; it is uncertain whether redesign proposals aimed at alleviating those problems are l...
Erik Frøkjær, Kasper Hornbæk
POPL
2008
ACM
14 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
POPL
2007
ACM
14 years 10 months ago
Preferential path profiling: compactly numbering interesting paths
Path profiles provide a more accurate characterization of a program's dynamic behavior than basic block or edge profiles, but are relatively more expensive to collect. This h...
Kapil Vaswani, Aditya V. Nori, Trishul M. Chilimbi
POPL
2007
ACM
14 years 10 months ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
« Prev « First page 3078 / 3156 Last » Next »