Sciweavers

1993 search results - page 320 / 399
» On Action Theory Change
Sort
View
CHI
2010
ACM
14 years 4 months ago
Reactive information foraging for evolving goals
Information foraging models have predicted the navigation paths of people browsing the web and (more recently) of programmers while debugging, but these models do not explicitly m...
Joseph Lawrance, Margaret M. Burnett, Rachel K. E....
CHI
2010
ACM
14 years 4 months ago
Interactive effects of age and interface differences on search strategies and performance
We present results from an experiment that studied the information search behavior of younger and older adults in a medical decision-making task. To study how different combinatio...
Jessie Chin, Wai-Tat Fu
IDTRUST
2009
ACM
14 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
VMCAI
2009
Springer
14 years 4 months ago
Synthesizing Switching Logic Using Constraint Solving
A new approach based on constraint solving techniques was recently proposed for verification of hybrid systems. This approach works by searching for inductive invariants of a give...
Ankur Taly, Sumit Gulwani, Ashish Tiwari
SEFM
2009
IEEE
14 years 4 months ago
Adjusted Verification Rules for Loops Are More Complete and Give Better Diagnostics for Less
—Increasingly, tools and their underlying theories are able to cope with “real code” written as part of industrial grade applications almost as is. It has been our experience...
Patrice Chalin