Sciweavers

35419 search results - page 234 / 7084
» How are we doing
Sort
View
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
ECAL
2005
Springer
15 years 10 months ago
How Niche Construction Can Guide Coevolution
Niche construction is the process whereby organisms, through their metabolism, activities, and choices, modify their own and/or each other’s niches. Our purpose is to clarify the...
Reiji Suzuki, Takaya Arita
SPIN
2005
Springer
15 years 10 months ago
Execution Generated Test Cases: How to Make Systems Code Crash Itself
Abstract. This paper presents a technique that uses code to automatically generate its own test cases at run-time by using a combination of symbolic and concrete (i.e., regular) ex...
Cristian Cadar, Dawson R. Engler
ETRA
2010
ACM
233views Biometrics» more  ETRA 2010»
15 years 10 months ago
Visual search in the (un)real world: how head-mounted displays affect eye movements, head movements and target detection
Head-mounted displays (HMDs) that use a see-through display method allow for superimposing computer-generated images upon a real-world view. Such devices, however, normally restri...
Tobit Kollenberg, Alexander Neumann, Dorothe Schne...
IAW
2003
IEEE
15 years 10 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...