Sciweavers

130 search results - page 18 / 26
» Preliminary Evaluation of a Formal Approach to User Interfac...
Sort
View
ACSAC
2002
IEEE
14 years 19 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
UIST
2003
ACM
14 years 27 days ago
Classroom BRIDGE: using collaborative public and desktop timelines to support activity awareness
Classroom BRIDGE supports activity awareness by facilitating planning and goal revision in collaborative, project-based middle school science. It integrates largescreen and deskto...
Craig H. Ganoe, Jacob P. Somervell, Dennis C. Neal...
IUI
2012
ACM
12 years 3 months ago
Style by demonstration: teaching interactive movement style to robots
The style in which a robot moves, expressed through its gait or locomotion, can convey effective messages to people. For example, a robot could move aggressively in reaction to a ...
James Everett Young, Kentaro Ishii, Takeo Igarashi...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Plug-and-Play Architectural Design and Verification
Abstract. In software architecture, components represent the computational units of a system and connectors represent the interactions among those units. Making decisions about the...
Shangzhu Wang, George S. Avrunin, Lori A. Clarke
CODES
2006
IEEE
14 years 1 months ago
Generic netlist representation for system and PE level design exploration
Designer productivity and design predictability are vital factors for successful embedded system design. Shrinking time-to-market and increasing complexity of these systems requir...
Bita Gorjiara, Mehrdad Reshadi, Pramod Chandraiah,...