Sciweavers

2501 search results - page 209 / 501
» Obligations and Their Interaction with Programs
Sort
View
JALC
2006
125views more  JALC 2006»
15 years 4 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
JMLR
2006
80views more  JMLR 2006»
15 years 4 months ago
Using Machine Learning to Guide Architecture Simulation
An essential step in designing a new computer architecture is the careful examination of different design options. It is critical that computer architects have efficient means by ...
Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Cald...
VL
2010
IEEE
247views Visual Languages» more  VL 2010»
15 years 3 months ago
Cleanroom: Edit-Time Error Detection with the Uniqueness Heuristic
Many dynamic programming language features, such as implicit declaration, reflection, and code generation, make it difficult to verify the existence of identifiers through standar...
Andrew J. Ko, Jacob O. Wobbrock
CHI
2009
ACM
16 years 5 months ago
Musink: composing music through augmented drawing
We focus on the creative use of paper in the music composition process, particularly the interaction between paper and end-user programming. When expressing musical ideas, compose...
Theophanis Tsandilas, Catherine Letondal, Wendy E....
CHI
2006
ACM
16 years 5 months ago
Answering why and why not questions in user interfaces
Modern applications such as Microsoft Word have many automatic features and hidden dependencies that are frequently helpful but can be mysterious to both novice and expert users. ...
Brad A. Myers, David A. Weitzman, Andrew Jensen Ko...