Sciweavers

2604 search results - page 51 / 521
» Human Errors and System Requirements
Sort
View
CHI
2000
ACM
14 years 2 hour ago
Providing integrated toolkit-level support for ambiguity in recognition-based interfaces
Interfaces based on recognition technologies are used extensively in both the commercial and research worlds. But recognizers are still error-prone, and this results in human perf...
Jennifer Mankoff, Scott E. Hudson, Gregory D. Abow...
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
IAAI
2001
13 years 9 months ago
Interchanging Agents and Humans in Military Simulation
The innovative reapplication of a multi-agent system for human-in-the-loop (HIL) simulation was a consequence of appropriate agent oriented design. The use of intelligent agents f...
Clinton Heinze, Simon Goss, Torgny Josefsson, Kerr...
SECON
2008
IEEE
14 years 2 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
ICCV
2011
IEEE
12 years 7 months ago
Multiclass Recognition and Part Localization with Humans in the Loop
We propose a visual recognition system that is designed for fine-grained visual categorization. The system is composed of a machine and a human user. The user, who is unable to c...
Catherine Wah, Steven Branson, Pietro Perona, Serg...