Sciweavers

1965 search results - page 271 / 393
» On the analysis of interacting pushdown systems
Sort
View
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CHI
2009
ACM
14 years 9 months ago
Lightweight tagging expands information and activity management practices
Could people use tagging to manage day-to-day work in their personal computing environment? Could tagging be sufficiently generic and lightweight to support diverse ways of workin...
Gerard Oleksik, Max L. Wilson, Craig S. Tashman, E...
CHI
2009
ACM
14 years 9 months ago
Leveraging open-source software in the design and development process
This paper presents a case study of the NASA Ames Research Center HCI Group's design and development of a problem reporting system for NASA's next generation vehicle (to...
Collin Green, Irene Tollinger, Christian Ratterman...
CHI
2005
ACM
14 years 9 months ago
Six themes of the communicative appropriation of photographic images
In this paper, we explore the use of digital photographs in computer-mediated communication. We present Lascaux, an instant messaging client that serves as a research platform for...
Amy Voida, Elizabeth D. Mynatt
CHI
2004
ACM
14 years 9 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman