Sciweavers

386 search results - page 70 / 78
» Model Classifications and Automated Verification
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
CADE
2005
Springer
14 years 8 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
EICS
2011
ACM
12 years 11 months ago
A model-based approach for distributed user interfaces
This paper describes a model-based approach for designing distributed user interfaces (DUIs), i.e. graphical user interfaces that are distributed along one or many of the followin...
Jérémie Melchior, Jean Vanderdonckt,...
CHI
2009
ACM
14 years 8 months ago
Learning to predict information needs: context-aware display as a cognitive aid and an assessment tool
We discuss the problem of assessing and aiding user performance in dynamic tasks that require rapid selection among multiple information sources. Motivated by research in human se...
Bradley C. Love, Matt Jones, Marc T. Tomlinson, Mi...
CSCW
2008
ACM
13 years 9 months ago
Assistance: the work practices of human administrative assistants and their implications for it and organizations
Assistance – work carried out by one entity in support of another – is a concept of long-standing interest, both as a type of human work common in organizations and as a model...
Thomas Erickson, Catalina M. Danis, Wendy A. Kello...